Sciweavers

21430 search results - page 4007 / 4286
» Abstract Effective Models
Sort
View
ASIACRYPT
2009
Springer
15 years 11 months ago
Security Notions and Generic Constructions for Client Puzzles
Computational puzzles are mildly difficult computational problems that require resources (processor cycles, memory, or both) to solve. Puzzles have found a variety of uses in secu...
Liqun Chen, Paul Morrissey, Nigel P. Smart, Bogdan...
CIKM
2009
Springer
15 years 11 months ago
MagicCube: choosing the best snippet for each aspect of an entity
Wikis are currently used in business to provide knowledge management systems, especially for individual organizations. However, building wikis manually is a laborious and time-con...
Yexin Wang, Li Zhao, Yan Zhang
HASE
2008
IEEE
15 years 11 months ago
Localizing Program Errors via Slicing and Reasoning
Model-based program debugging exploits discrepancies between the program behavior anticipated by a programmer and the program’s actual behavior when executed on a set of inputs....
Fei Pu, Yan Zhang
HICSS
2008
IEEE
136views Biometrics» more  HICSS 2008»
15 years 11 months ago
The Influence of Instant Messaging Usage Behavior on Organizational Communication Satisfaction
In recent years, instant messaging (IM) has become a popular medium of online communication. While IM is expanding into the enterprise beyond personal use, it brings the convenien...
Shih-Ming Pi, Yi-Chih Liu, Tsang-Yao Chen, Shih-Hu...
INFOCOM
2008
IEEE
15 years 10 months ago
Link Lifetimes and Randomized Neighbor Selection in DHTs
—Several models of user churn, resilience, and link lifetime have recently appeared in the literature [12], [13], [34], [35]; however, these results do not directly apply to clas...
Zhongmei Yao, Dmitri Loguinov
« Prev « First page 4007 / 4286 Last » Next »