Sciweavers

5634 search results - page 237 / 1127
» About Abstract Classes
Sort
View
HUC
2003
Springer
15 years 4 months ago
Social Network Computing
Abstract. A ubiquitous wearable computing infrastructure is now firmly entrenched within organizations across the globe, yet much of its potential remains untapped. This paper desc...
Nathan Eagle, Alex Pentland
MPC
2010
Springer
157views Mathematics» more  MPC 2010»
15 years 4 months ago
The Logic of Large Enough
Abstract. In this paper we explore the “for large enough” quantifier, also known as “all but finitely many”, which plays a central role in asymptotic reasoning, as used f...
Eerke A. Boiten, Dan Grundy
ICC
2000
IEEE
103views Communications» more  ICC 2000»
15 years 4 months ago
Implementation and Measurements of Simple Integrated Media Access (SIMA) Network Nodes
Abstract—This paper provides an overview of an implementation of Differentiated Services interior and boundary nodes as described in the SIMA model. The operation of the network ...
Juha Laine, Sampo Saaristo, Jussi Lemponen, Jarmo ...
ASM
2000
ASM
15 years 4 months ago
Partially Ordered Runs: A Case Study
Abstract. We look at some sources of insecurity and difficulty in reasoning about partially ordered runs of distributed ASMs, and propose some techniques to facilitate such reasoni...
Yuri Gurevich, Dean Rosenzweig
FSE
1993
Springer
148views Cryptology» more  FSE 1993»
15 years 3 months ago
Design Principles for Dedicated Hash Functions
Abstract. Dedicated hash functions are cryptographically secure compression functions which are designed specifically for hashing. They intend to form a practical alternative for ...
Bart Preneel