Sciweavers

9186 search results - page 1564 / 1838
» A Module System for Scheme
Sort
View
WAOA
2005
Springer
92views Algorithms» more  WAOA 2005»
15 years 8 months ago
The Conference Call Search Problem in Wireless Networks
Cellular telephony systems, where locations of mobile users are unknown at some times, are becoming more common. In such systems, mobile users are roaming in a zone and a user repo...
Leah Epstein, Asaf Levin
SIGOPSE
2000
ACM
15 years 7 months ago
Congestion prices as feedback signals: an approach to QoS management
Recently there has been a renewed interest in the application of economic models to the management of computational resources. Most of this interest is focused on pricing models f...
Rolf Neugebauer, Derek McAuley
ACNS
2004
Springer
85views Cryptology» more  ACNS 2004»
15 years 7 months ago
CamouflageFS: Increasing the Effective Key Length in Cryptographic Filesystems on the Cheap
One of the few quantitative metrics used to evaluate the security of a cryptographic file system is the key length of the encryption algorithm; larger key lengths correspond to hig...
Michael E. Locasto, Angelos D. Keromytis
99
Voted
CCS
2008
ACM
15 years 5 months ago
Robust content-driven reputation
In content-driven reputation systems for collaborative content, users gain or lose reputation according to how their contributions fare: authors of long-lived contributions gain r...
Krishnendu Chatterjee, Luca de Alfaro, Ian Pye
AMC
2006
104views more  AMC 2006»
15 years 3 months ago
Three counterexamples refuting Kieu's plan for "quantum adiabatic hypercomputation"; and some uncomputable quantum mechanical ta
-- Tien D. Kieu, in 10 papers posted to the quant-ph section of the xxx.lanl.gov preprint archive [some of which were also published in printed journals such as Proc. Royal Soc. A ...
Warren D. Smith
« Prev « First page 1564 / 1838 Last » Next »