Sciweavers

102 search results - page 18 / 21
» Challenges in the Specification of Full Contracts
Sort
View
CCS
2010
ACM
14 years 9 months ago
In search of an anonymous and secure lookup: attacks on structured peer-to-peer anonymous communication systems
The ability to locate random relays is a key challenge for peer-to-peer (P2P) anonymous communication systems. Earlier attempts like Salsa and AP3 used distributed hash table look...
Qiyan Wang, Prateek Mittal, Nikita Borisov
BMCBI
2007
108views more  BMCBI 2007»
14 years 9 months ago
Publishing perishing? Towards tomorrow's information architecture
Scientific articles are tailored to present information in human-readable aliquots. Although the Internet has revolutionized the way our society thinks about information, the trad...
Michael R. Seringhaus, Mark B. Gerstein
CN
2008
117views more  CN 2008»
14 years 9 months ago
Packet-switched network selection with the highest QoS in 4G networks
The evolution of telecommunications during the last decades has been enormous and as a result, nowadays, people find themselves before the challenge of 4G networks. Due to the fac...
Dimitris E. Charilas, Ourania I. Markaki, Dimitris...
SIGCSE
2008
ACM
143views Education» more  SIGCSE 2008»
14 years 9 months ago
Test-driven learning in early programming courses
Coercing new programmers to adopt disciplined development practices such as thorough unit testing is a challenging endeavor. Test-driven development (TDD) has been proposed as a s...
David Janzen, Hossein Saiedian
SIGIR
2008
ACM
14 years 9 months ago
On profiling blogs with representative entries
With an explosive growth of blogs, information seeking in blogosphere becomes more and more challenging. One example task is to find the most relevant topical blogs against a give...
Jinfeng Zhuang, Steven C. H. Hoi, Aixin Sun