Sciweavers

43264 search results - page 8247 / 8653
» Comparing models of computation
Sort
View
DIM
2005
ACM
15 years 5 months ago
Usable presentation of secure pseudonyms
Privacy-Enhancing Identity Management (PIM) enables users to control which personal information they provide to their communication partner(s) by partitioning their personal infor...
Katrin Borcea-Pfitzmann, Elke Franz, Andreas Pfitz...
113
Voted
CIA
2008
Springer
15 years 5 months ago
Collaborative Load-Balancing in Storage Networks Using Agent Negotiation
Abstract. The rapid advances in the computer industry allow building larger systems that require mass storage volumes. As storage space increases, its management becomes increasing...
Shay Raz, Raz Lin, Onn Shehory
122
Voted
CIMCA
2008
IEEE
15 years 5 months ago
Portlets-Based Portal for an E-learning Grid
This paper describes a portlet-based portal that provides user interfaces for access a Grid-based elearning platform. E-learning platforms that exploit resources and computing pow...
Felicia Ionescu, Cristina Elena Stoica, Mircea Dea...
132
Voted
COCOON
2008
Springer
15 years 5 months ago
Spreading Messages
Abstract. We model a network in which messages spread by a simple directed graph G = (V, E) [1] and a function : V N mapping each v V to a positive integer less than or equal to...
Ching-Lueh Chang, Yuh-Dauh Lyuu
COMPGEOM
2008
ACM
15 years 5 months ago
The complexity of the outer face in arrangements of random segments
We investigate the complexity of the outer face in arrangements of line segments of a fixed length in the plane, drawn uniformly at random within a square. We derive upper bounds ...
Noga Alon, Dan Halperin, Oren Nechushtan, Micha Sh...
« Prev « First page 8247 / 8653 Last » Next »