Sciweavers

1027 search results - page 62 / 206
» Opening Up The Enterprise
Sort
View
SPW
1997
Springer
15 years 4 months ago
Protocol Interactions and the Chosen Protocol Attack
There are many cases in the literature in which reuse of the same key material for different functions can open up security holes. In this paper, we discuss such interactions betw...
John Kelsey, Bruce Schneier, David Wagner
DAGM
2004
Springer
15 years 3 months ago
Accurate and Efficient Approximation of the Continuous Gaussian Scale-Space
Abstract. The Gaussian scale-space is a standard tool in image analysis. While continuous in theory, it is generally realized with fixed regular grids in practice. This prevents th...
Ullrich Köthe
ECOOP
2004
Springer
15 years 3 months ago
Reflections on Programming with Grid Toolkits
Abstract. Grid applications are fragile when changes to service implementations, non-functional properties or communication protocols take place. Moreover, developing Grid applicat...
Emiliano Tramontana, Ian Welch
USENIX
2008
15 years 2 months ago
Automatic Optimization of Parallel Dataflow Programs
Large-scale parallel dataflow systems, e.g., Dryad and Map-Reduce, have attracted significant attention recently. High-level dataflow languages such as Pig Latin and Sawzall are b...
Christopher Olston, Benjamin Reed, Adam Silberstei...
ITS
2010
Springer
149views Multimedia» more  ITS 2010»
15 years 1 months ago
How Adaptive Is an Expert Human Tutor?
In examine the tutoring protocols of one expert human tutor tutoring 10 students in solving physics problems, four analyses reveal that he tutored the five good learners in differe...
Michelene T. H. Chi, Marguerite Roy