Sciweavers

8600 search results - page 1514 / 1720
» Measuring with Timed Patterns
Sort
View
138
Voted
TCC
2004
Springer
147views Cryptology» more  TCC 2004»
15 years 9 months ago
Computational Collapse of Quantum State with Application to Oblivious Transfer
Quantum 2-party cryptography differs from its classical counterpart in at least one important way: Given blak-box access to a perfect commitment scheme there exists a secure 1−2...
Claude Crépeau, Paul Dumais, Dominic Mayers...
130
Voted
IMC
2003
ACM
15 years 9 months ago
Best-path vs. multi-path overlay routing
Time-varying congestion on Internet paths and failures due to software, hardware, and configuration errors often disrupt packet delivery on the Internet. Many aproaches to avoidi...
David G. Andersen, Alex C. Snoeren, Hari Balakrish...
161
Voted
KCAP
2003
ACM
15 years 9 months ago
Capturing interest through inference and visualization: ontological user profiling in recommender systems
Tools for filtering the World Wide Web exist, but they are hampered by the difficulty of capturing user preferences in such a diverse and dynamic environment. Recommender systems ...
Stuart E. Middleton, Nigel R. Shadbolt, David De R...
129
Voted
SPAA
2003
ACM
15 years 9 months ago
On local algorithms for topology control and routing in ad hoc networks
An ad hoc network is a collection of wireless mobile hosts forming a temporary network without the aid of any fixed infrastructure. Indeed, an important task of an ad hoc network...
Lujun Jia, Rajmohan Rajaraman, Christian Scheidele...
134
Voted
HT
2010
ACM
15 years 8 months ago
Parallel browsing behavior on the web
Parallel browsing describes a behavior where users visit Web pages in multiple concurrent threads. Web browsers explicitly support this by providing tabs. Although parallel browsi...
Jeff Huang, Ryen W. White
« Prev « First page 1514 / 1720 Last » Next »