Sciweavers

7200 search results - page 1152 / 1440
» On the Computational Power of Winner-Take-All
Sort
View
115
Voted
STOC
2006
ACM
112views Algorithms» more  STOC 2006»
15 years 6 months ago
Limitations of quantum coset states for graph isomorphism
It has been known for some time that graph isomorphism reduces to the hidden subgroup problem (HSP). What is more, most exponential speedups in quantum computation are obtained by...
Sean Hallgren, Cristopher Moore, Martin Rötte...
104
Voted
VALUETOOLS
2006
ACM
107views Hardware» more  VALUETOOLS 2006»
15 years 6 months ago
Thresholds for virus spread on networks
We study how the spread of computer viruses, worms, and other self-replicating malware is affected by the logical topology of the network over which they propagate. We consider a...
Moez Draief, Ayalvadi J. Ganesh, Laurent Massouli&...
WIKIS
2006
ACM
15 years 6 months ago
How to use a Wiki in education: 'Wiki based effective constructive learning'
Learning effectiveness depends on a large range of parameters. Learners’ activity has an important impact on long-term learning and comprehension of difficult concepts [1]. Coll...
Michele Notari
105
Voted
WOWMOM
2006
ACM
109views Multimedia» more  WOWMOM 2006»
15 years 6 months ago
Selective Channel Feedback Mechanisms for Wireless Multichannel Scheduling
Opportunistic scheduling can significantly improve wireless network performance by exploiting the feedback information that conveys the underlying channel condition. In emerging ...
Young-June Choi, Saewoong Bahk
77
Voted
ACSAC
2005
IEEE
15 years 6 months ago
Lessons Learned: A Security Analysis of the Internet Chess Club
The Internet Chess Club (ICC) is a popular online chess server with more than 30,000 members worldwide including various celebrities and the best chess players in the world. Altho...
John Black, Martin Cochran, Martin Ryan Gardner
« Prev « First page 1152 / 1440 Last » Next »