Sciweavers

5055 search results - page 962 / 1011
» Relative Timing
Sort
View
CRYPTO
2010
Springer
162views Cryptology» more  CRYPTO 2010»
15 years 1 days ago
On Strong Simulation and Composable Point Obfuscation
The Virtual Black Box (VBB) property for program obfuscators provides a strong guarantee: Anything computable by an efficient adversary given the obfuscated program can also be co...
Nir Bitansky, Ran Canetti
ICDE
2010
IEEE
167views Database» more  ICDE 2010»
15 years 1 days ago
Top-k pipe join
Abstract—In the context of service composition and orchestration, service invocation is typically scheduled according to execution plans, whose topology establishes whether diffe...
Davide Martinenghi, Marco Tagliasacchi
GLOBECOM
2008
IEEE
15 years 1 hour ago
Improving BitTorrent Traffic Performance by Exploiting Geographic Locality
Abstract--Current implementations of BitTorrent-like P2P applications ignore the underlying Internet topology hence incur a large amount of traffic both inside an Internet Service ...
Chen Tian, Xue Liu, Hongbo Jiang, Wenyu Liu, Yi Wa...
AIEDU
2007
86views more  AIEDU 2007»
14 years 12 months ago
A Study of Feedback Strategies in Foreign Language Classrooms and Tutorials with Implications for Intelligent Computer-Assisted
This paper presents two new corpus-based studies of feedback in the domain of teaching Spanish as a foreign language, concentrating on the type and frequency of different feedback ...
Anita Ferreira, Johanna D. Moore, Chris Mellish
AIL
2007
126views more  AIL 2007»
14 years 12 months ago
A web ontologies framework for digital rights management
In order to improve the management of copyright in the Internet, known as Digital Rights Management, there is the need for a shared language for copyright representation. Current a...
Roberto García, Rosa Gil, Jaime Delgado