Sciweavers

1503 search results - page 145 / 301
» Designing situations
Sort
View
158
Voted
IM
2007
15 years 4 months ago
Using the Power of Two Choices to Improve Bloom Filters
We consider the combination of two ideas from the hashing literature: the power of two choices and Bloom filters. Specifically, we show via simulations that, in comparison with a...
Steven S. Lumetta, Michael Mitzenmacher
INFORMATICALT
2007
112views more  INFORMATICALT 2007»
15 years 4 months ago
A New ID-Based Deniable Authentication Protocol
Abstract. Deniable authenticated protocol is a new cryptographic authentication protocol that enables a designated receiver to identify the source of a given message without being ...
Rongxing Lu, Zhenfu Cao, Shengbao Wang, Haiyong Ba...
168
Voted
JCP
2007
87views more  JCP 2007»
15 years 4 months ago
Towards a Web Platform for Collaborative Learning Practice, Evaluation and Dissemination
—Computer Supported Collaborative Learning (CSCL) tool adoption is slow and challenging when compared to the dissemination of simpler content delivery systems. The lack of techni...
Jacques Lonchamp
136
Voted
AAI
2004
136views more  AAI 2004»
15 years 4 months ago
Between Location Awareness and Aware Locations: Where to Put The Intelligence
Location awareness is a key ingredient to many applications of mobile devices. Devices with the ability to determine their own position in space can retrieve, filter or present in...
Andreas Butz
TVCG
2008
112views more  TVCG 2008»
15 years 4 months ago
VisComplete: Automating Suggestions for Visualization Pipelines
Building visualization and analysis pipelines is a large hurdle in the adoption of visualization and workflow systems by domain scientists. In this paper, we propose techniques to ...
David Koop, Carlos Eduardo Scheidegger, Steven P. ...