Sciweavers

1265 search results - page 73 / 253
» Computer poker: A review
Sort
View
ISCI
2002
132views more  ISCI 2002»
14 years 9 months ago
Mobile data and transaction management
Mobile computing paradigm has emerged due to advances in wireless or cellular networking technology. This rapidly expanding technology poses many challenging research problems in ...
Sanjay Kumar Madria, Mukesh K. Mohania, Sourav S. ...
TAMC
2009
Springer
15 years 4 months ago
Searching Trees: An Essay
We are reviewing recent advances in the run time analysis of search tree algorithms, including indications to open problems. In doing so, we also try to cover the historical dimens...
Henning Fernau, Daniel Raible
AIMS
2007
Springer
15 years 4 months ago
Peer-to-Peer Large-Scale Collaborative Storage Networks
Abstract. This paper presents the idea of a fully decentralized peer-to-peer collaborative network with a robust, scalable and incentive-compatible system enabling storage, retriev...
Thomas Bocek, Burkhard Stiller
ACSAC
2005
IEEE
15 years 3 months ago
Looking Back at the Bell-La Padula Model
The Bell-La Padula security model produced conceptual tools for the analysis and design of secure computer systems. Together with its sibling engineering initiatives, it identifi...
David Elliott Bell
GI
2005
Springer
15 years 3 months ago
Service Classification versus Configuration
: We briefly review service classification schemes, originating especially from marketing research work, and analyze to what extent they are useful for ontology-based service confi...
Ziv Baida, Hans Akkermans, Jaap Gordijn