Sciweavers

9818 search results - page 2 / 1964
» Much Support and More
Sort
View
CCS
2007
ACM
15 years 3 months ago
How much anonymity does network latency leak?
Low-latency anonymity systems such as Tor, AN.ON, Crowds, and Anonymizer.com aim to provide anonymous connections that are both untraceable by “local” adversaries who control ...
Nicholas Hopper, Eugene Y. Vasserman, Eric Chan-Ti...
HASE
2008
IEEE
15 years 4 months ago
Small Logs for Transactional Services: Distinction is Much More Accurate than (Positive) Discrimination
For complex services, logging is an integral part of many middleware aspects, especially, transactions and monitoring. In the event of a failure, the log allows us to deduce the c...
Debmalya Biswas, Thomas Gazagnaire, Blaise Genest
AIED
2005
Springer
15 years 3 months ago
Serious Games for Language Learning: How Much Game, How Much AI?
Modern computer games show potential not just for engaging and entertaining users, but also in promoting learning. Game designers employ a range of techniques to promote long-term ...
W. Lewis Johnson, Hannes Högni Vilhjál...
IJCAI
2007
14 years 11 months ago
Cooperating Reasoning Processes: More than Just the Sum of Their Parts
Using the achievements of my research group over the last 30+ years, I provide evidence to support the following hypothesis: By complementing each other, cooperating reasoning pro...
Alan Bundy
FC
2008
Springer
102views Cryptology» more  FC 2008»
14 years 11 months ago
Identity Theft: Much Too Easy? A Study of Online Systems in Norway
Governments and commercial companies connect more and more computer systems to the Internet, giving people easier access to services. Many of these online services handle personal ...
André N. Klingsheim, Kjell Jørgen Ho...