Sciweavers

1644 search results - page 21 / 329
» Finding Dominators in Practice
Sort
View
ELPUB
2007
ACM
15 years 1 months ago
A Comparison of the Blogging Practices of UK and US Bloggers
This paper describes the results of an investigation into the differences and similarities between the blogging techniques of UK and US bloggers undertaken in the winter and sprin...
Sarah Pedersen
AAAI
2008
15 years 8 days ago
Anticipatory Perceptual Simulation for Human-Robot Joint Practice: Theory and Application Study
With the aim of fluency and efficiency in human-robot teams, we have developed a cognitive architecture based on the neuro-psychological principles of anticipation and perceptual ...
Guy Hoffman, Cynthia Breazeal
OOPSLA
2009
Springer
15 years 4 months ago
The commenting practice of open source
The development processes of open source software are different from traditional closed source development processes. Still, open source software is frequently of high quality. Th...
Oliver Arafat, Dirk Riehle
IJACT
2008
101views more  IJACT 2008»
14 years 10 months ago
Practical key-recovery attack against APOP, an MD5-based challenge-response authentication
Abstract: Hash functions are used in many cryptographic constructions under various assumptions, and the practical impact of collision attacks is often unclear. In this paper, we s...
Gaëtan Leurent
FAST
2011
14 years 1 months ago
A Study of Practical Deduplication
We collected file system content data from 857 desktop computers at Microsoft over a span of 4 weeks. We analyzed the data to determine the relative efficacy of data deduplication...
Dutch T. Meyer, William J. Bolosky