Sciweavers

5456 search results - page 999 / 1092
» A study of Object Evolution
Sort
View
267
Voted
POPL
2001
ACM
16 years 4 months ago
Mobile values, new names, and secure communication
We study the interaction of the "new" construct with a rich but common form of (first-order) communication. This interaction is crucial in security protocols, which are ...
Cédric Fournet, Martín Abadi
SODA
2010
ACM
177views Algorithms» more  SODA 2010»
16 years 1 months ago
Convergence, Stability, and Discrete Approximation of Laplace Spectra
Spectral methods have been widely used in a broad range of application fields. One important object involved in such methods is the Laplace-Beltrami operator of a manifold. Indeed...
Tamal K. Dey, Pawas Ranjan, Yusu Wang
ECIR
2009
Springer
16 years 27 days ago
Current Developments in Information Retrieval Evaluation
: In the last decade, many evaluation results have been created within the evaluation initiatives like TREC, NTCIR and CLEF. The large amount of data available has led to substanti...
Thomas Mandl
124
Voted
ASPLOS
2010
ACM
15 years 10 months ago
ConMem: detecting severe concurrency bugs through an effect-oriented approach
Multicore technology is making concurrent programs increasingly pervasive. Unfortunately, it is difficult to deliver reliable concurrent programs, because of the huge and non-det...
Wei Zhang, Chong Sun, Shan Lu
125
Voted
CHI
2009
ACM
15 years 10 months ago
O' game, can you feel my frustration?: improving user's gaming experience via stresscam
One of the major challenges of video game design is to have appropriate difficulty levels for users in order to maximize the entertainment value of the game. Game players may lose...
Chang Yun, Dvijesh Shastri, Ioannis Pavlidis, Zhig...