Sciweavers

9521 search results - page 251 / 1905
» Compiling with continuations, continued
Sort
View
IJNSEC
2008
96views more  IJNSEC 2008»
15 years 3 months ago
On the Effectiveness of Continuous-Time Mixes under Flow-Correlation Based Anonymity Attacks
In flow-based mix networks, flow correlation attacks have been proposed earlier and have been shown empirically to seriously degrade mix-based anonymous communication systems. In ...
Ye Zhu, Xinwen Fu, Riccardo Bettati
90
Voted
CI
2007
88views more  CI 2007»
15 years 3 months ago
From Discrete-Time Models to Continuous-Time, Asynchronous Modeling of Financial Markets
Katalin Boer, Uzay Kaymak, Jaap Spiering
96
Voted
CIE
2007
Springer
15 years 3 months ago
Embedded noninteractive continuous bot detection
Roman V. Yampolskiy, Venu Govindaraju
128
Voted
IGPL
2006
107views more  IGPL 2006»
15 years 3 months ago
Undecidability over Continuous Time
Since 1996, some models of recursive functions over the real numbers have been analyzed by several researchers. It could be expected that they exhibit a computational power much g...
Jerzy Mycka, José Félix Costa