Sciweavers

6274 search results - page 1223 / 1255
» From query complexity to computational complexity
Sort
View
121
Voted
DSVIS
2003
Springer
15 years 9 months ago
Calligraphic Interfaces: Mixed Metaphors for Design
CAD systems have yet to become usable at the early stages of product ideation, where precise shape definitions and sometimes even design intentions are not fully developed. To over...
João Paulo Pereira, Joaquim A. Jorge, Vasco...
119
Voted
ICALP
2003
Springer
15 years 9 months ago
Fixed-Parameter Algorithms for the (k, r)-Center in Planar Graphs and Map Graphs
The (k, r)-center problem asks whether an input graph G has ≤ k vertices (called centers) such that every vertex of G is within distance ≤ r from some center. In this paper we ...
Erik D. Demaine, Fedor V. Fomin, Mohammad Taghi Ha...
143
Voted
IDEAL
2003
Springer
15 years 9 months ago
Detecting Distributed Denial of Service (DDoS) Attacks through Inductive Learning
As the complexity of Internet is scaled up, it is likely for the Internet resources to be exposed to Distributed Denial of Service (DDoS) flooding attacks on TCP-based Web servers....
Sanguk Noh, Cheolho Lee, Kyunghee Choi, Gihyun Jun...
AGP
2010
IEEE
15 years 8 months ago
Constraint Logic Programming
Constraint Logic Programming (CLP) is one of the most successful branches of Logic Programming; it attracts the interest of theoreticians and practitioners, and it is currently use...
Marco Gavanelli, Francesca Rossi
117
Voted
HICSS
2002
IEEE
113views Biometrics» more  HICSS 2002»
15 years 8 months ago
Designing and Examining PC to Palm Collaboration
One trend in day-to-day computing involves moving seamlessly from large powerful workstations to small handheld devices. A second trend is continuous collaboration with colleagues...
Ivan Marsic, Allan Meng Krebs, Bogdan Dorohonceanu...
« Prev « First page 1223 / 1255 Last » Next »