Sciweavers

3674 search results - page 271 / 735
» Information Dependencies
Sort
View
INFOCOM
2005
IEEE
15 years 6 months ago
Limiting path exploration in BGP
— Slow convergence in the Internet can be directly attributed to the “path exploration” phenomenon, inherent in all path vector protocols. The root cause for path exploration...
Jaideep Chandrashekar, Zhenhai Duan, Zhi-Li Zhang,...
ICPP
1993
IEEE
15 years 4 months ago
A Unified Model for Concurrent Debugging
: Events are occurrence instances of actions. The thesis of this paper is that the use of “actions”, instead of events, greatly simplifies the problem of concurrent debugging....
S. I. Hyder, John Werth, James C. Browne
AI
2000
Springer
15 years 17 days ago
Using temporal logics to express search control knowledge for planning
Over the years increasingly sophisticated planning algorithms have been developed. These have made for more efficient planners, but unfortunately these planners still suffer from ...
Fahiem Bacchus, Froduald Kabanza
109
Voted
SP
2006
IEEE
110views Security Privacy» more  SP 2006»
15 years 6 months ago
Privacy and Contextual Integrity: Framework and Applications
Contextual integrity is a conceptual framework for understanding privacy expectations and their implications developed in the literature on law, public policy, and political philo...
Adam Barth, Anupam Datta, John C. Mitchell, Helen ...
101
Voted
JUCS
2008
130views more  JUCS 2008»
15 years 20 days ago
"Fine Tuning" Image Accessibility for Museum Web Sites
: Accessibility and usability guidelines are available to design web sites accessible to blind users. However, the actual usability of accessible web pages varies depending on the ...
Barbara Leporini, Ivan Norscia