Sciweavers

15421 search results - page 2965 / 3085
» Dependability
Sort
View
124
Voted
INTR
2007
81views more  INTR 2007»
15 years 5 months ago
Network externality and future usage of Internet services
Purpose – The purpose of this paper is to investigate different effects of three network externality factors, i.e. local network size, network strength, and total network size, ...
Sung Yong Chun, Minhi Hahn
IPL
2007
99views more  IPL 2007»
15 years 5 months ago
Substitutions into propositional tautologies
We prove that there is a polynomial time substitution (y1, . . . , yn) := g(x1, . . . , xk) with k << n such that whenever the substitution instance A(g(x1, . . . , xk)) of ...
Jan Krajícek
IPL
2007
72views more  IPL 2007»
15 years 5 months ago
How to safely close a discussion
In the secure communication problem, we focus on safe termination. In applications such as electronic transactions, we want each party to be ensured that both sides agree on the s...
Gildas Avoine, Serge Vaudenay
138
Voted
TCS
2008
15 years 5 months ago
Arbitrary pattern formation by asynchronous, anonymous, oblivious robots
From an engineering point of view, the problem of coordinating a set of autonomous, mobile robots for the purpose of cooperatively performing a task has been studied extensively o...
Paola Flocchini, Giuseppe Prencipe, Nicola Santoro...
IPM
2007
137views more  IPM 2007»
15 years 5 months ago
Analyzing imbalance among homogeneous index servers in a web search system
The performance of parallel query processing in a cluster of index servers is crucial for modern web search systems. In such a scenario, the response time basically depends on the...
Claudine Santos Badue, Ricardo A. Baeza-Yates, Ber...
« Prev « First page 2965 / 3085 Last » Next »