Sciweavers

8724 search results - page 1473 / 1745
» Search result diversification
Sort
View
96
Voted
ECCC
2007
144views more  ECCC 2007»
15 years 23 days ago
Algebraic Lower Bounds for Computing on Encrypted Data
In cryptography, there has been tremendous success in building primitives out of homomorphic semantically-secure encryption schemes, using homomorphic properties in a blackbox way...
Rafail Ostrovsky, William E. Skeith III
109
Voted
JIRS
2006
113views more  JIRS 2006»
15 years 23 days ago
Using Virtual Pheromones and Cameras for Dispersing a Team of Multiple Miniature Robots
To safely and efficiently guide personnel of search and rescue operations in disaster areas, swift gathering of relevant information such as the locations of victims, must occur. U...
Janice L. Pearce, Bob Powers, Chistopher Hess, Pau...
106
Voted
JMLR
2006
117views more  JMLR 2006»
15 years 23 days ago
On the Complexity of Learning Lexicographic Strategies
Fast and frugal heuristics are well studied models of bounded rationality. Psychological research has proposed the take-the-best heuristic as a successful strategy in decision mak...
Michael Schmitt, Laura Martignon
JNW
2006
120views more  JNW 2006»
15 years 23 days ago
An EMST Based Look-up Protocol for Peer to Peer Networks
-- Peer-to-peer systems and applications are distributed systems without any centralized control. P2P systems form the basis of several applications, such as file sharing systems a...
Tarun Bansal, Pankaj Ghanshani
ENTCS
2007
115views more  ENTCS 2007»
15 years 23 days ago
A Global Algorithm for Model-Based Test Suite Generation
Abstract. Model-based testing has been proposed as a technique to automatically verify that a system conforms to its specification. A popular approach is to use a model-checker to...
Anders Hessel, Paul Pettersson
« Prev « First page 1473 / 1745 Last » Next »