Sciweavers

3937 search results - page 167 / 788
» Questioning Ubiquitous Computing
Sort
View
140
Voted
JSSPP
2001
Springer
15 years 8 months ago
SRPT Scheduling for Web Servers
This note briefly summarizes some results from two papers: [4] and [23]. These papers pose the following question: Is it possible to reduce the expected response time of every req...
Mor Harchol-Balter, Nikhil Bansal, Bianca Schroede...
116
Voted
EJIS
2006
108views more  EJIS 2006»
15 years 3 months ago
New frontiers for information systems research: computer art as an information system
This paper proposes extending the frontiers of information systems (IS) research by seeing computer art as a kind of information system. It explores some research questions that a...
Briony J. Oates
127
Voted
EXPCS
2007
15 years 7 months ago
Experimental economics and experimental computer science: a survey
In surprisingly many computer science research projects, system outcomes may be influenced by computerized or human agents with different economic incentives. Such studies include...
Jens Grossklags
119
Voted
CCS
2009
ACM
15 years 10 months ago
Computational soundness for key exchange protocols with symmetric encryption
Formal analysis of security protocols based on symbolic models has been very successful in finding flaws in published protocols and proving protocols secure, using automated too...
Ralf Küsters, Max Tuengerthal
129
Voted
FC
2005
Springer
83views Cryptology» more  FC 2005»
15 years 9 months ago
Secure Distributed Human Computation
We suggest a general paradigm of using large-scale distributed computation to solve difficult problems, but where humans can act as agents and provide candidate solutions. We are e...
Craig Gentry, Zulfikar Ramzan, Stuart G. Stubblebi...