Sciweavers

1707 search results - page 137 / 342
» A Computational Model for Arguments Understanding
Sort
View
ECOOP
2000
Springer
15 years 9 months ago
Distributed Asynchronous Collections: Abstractions for Publish/Subscribe Interaction
ions for Publish/Subscribe Interaction Patrick Th. Eugster1 , Rachid Guerraoui1 , and Joe Sventek2 1 Swiss Federal Institute of Technology, Lausanne 2 Agilent Laboratories Scotland...
Patrick Th. Eugster, Rachid Guerraoui, Joe Sventek
CANDT
2009
15 years 8 months ago
And the ringleaders were banned: an examination of protest in virtual worlds
Protest has made the jump between the offline and the online spaces and is frequently used in most virtual worlds available today. Despite the frequency of these protest actions i...
Bridget Marie Blodgett
DAGSTUHL
2007
15 years 6 months ago
QUAD: Overview and Recent Developments
We give an outline of the specification and provable security features of the QUAD stream cipher proposed at Eurocrypt 2006 [6]. The cipher relies on the iteration of a multivaria...
David Arditti, Côme Berbain, Olivier Billet,...
DAGSTUHL
2004
15 years 6 months ago
Testing with Functions as Specifications
Although computer systems penetrate all facets of society, the software running those systems may contain many errors. Producing high quality software appears to be difficult and v...
Pieter W. M. Koopman
155
Voted
CORR
2010
Springer
144views Education» more  CORR 2010»
15 years 4 months ago
Secure Transmission with Multiple Antennas II: The MIMOME Wiretap Channel
The capacity of the Gaussian wiretap channel model is analyzed when there are multiple antennas at the sender, intended receiver and eavesdropper. The associated channel matrices a...
Ashish Khisti, Gregory W. Wornell