Sciweavers

4281 search results - page 705 / 857
» How to Disembed a Program
Sort
View
JDFP
2006
139views more  JDFP 2006»
15 years 15 days ago
Discovering Hidden Evidence
Over the past decade, the advancement of a myriad of methods, techniques and technologies to conceal digital evidence and covertly communicate have increased at an alarming rate. I...
Chet Hosmer
84
Voted
ECCC
2007
122views more  ECCC 2007»
15 years 15 days ago
Infeasibility of Instance Compression and Succinct PCPs for NP
The OR-SAT problem asks, given Boolean formulae φ1, . . . , φm each of size at most n, whether at least one of the φi’s is satisfiable. We show that there is no reduction fr...
Lance Fortnow, Rahul Santhanam
JOT
2006
75views more  JOT 2006»
15 years 15 days ago
Porting the .NET Compact Framework to Symbian Phones
As a result of the increasing availability and processing capacity offered by portable devices, it is important for software providers to offer mobile services that seamlessly int...
Frank Siegemund, Robert Sugar, Alain Gefflaut, Fri...
123
Voted
NETWORK
2008
139views more  NETWORK 2008»
15 years 15 days ago
Composing semantic services in open sensor-rich environments
Consider a scenario where Jane is at an airport. She wants to find a restaurant with healthy food and short waiting time on the way to her terminal. The airport can provide such s...
Jie Liu, Feng Zhao
OCLC
2008
86views more  OCLC 2008»
15 years 15 days ago
Those who don't look don't find: disciplinary considerations in repository advocacy
Purpose of this paper By describing some of the often ignored aspects of repository advocacy, such as disciplinary differences and how these might affect the adoption of a particu...
Danny Kingsley