Sciweavers

3108 search results - page 177 / 622
» The Elements of Computer Credibility
Sort
View
147
Voted
GD
2004
Springer
15 years 10 months ago
Intersection Reverse Sequences and Geometric Applications
Pinchasi and Radoiˇci´c [11] used the following observation to bound the number of edges of a topological graph without a self-crossing cycle of length 4: if we make a list of t...
Adam Marcus, Gábor Tardos
IPTPS
2004
Springer
15 years 10 months ago
On Transport Layer Support for Peer-to-Peer Networks
TCP is the transport protocol used predominantly in the Internet as well as in peer-to-peer networks. However, peerto-peer networks exhibit very different characteristics from tho...
Hung-Yun Hsieh, Raghupathy Sivakumar
UPP
2004
Springer
15 years 10 months ago
Higher-Order Chemical Programming Style
The chemical reaction metaphor describes computation in terms of a chemical solution in which molecules interact freely according to reaction rules. Chemical solutions are represen...
Jean-Pierre Banâtre, Pascal Fradet, Yann Rad...
142
Voted
WEA
2004
Springer
129views Algorithms» more  WEA 2004»
15 years 10 months ago
Experimental Comparison of Greedy Randomized Adaptive Search Procedures for the Maximum Diversity Problem
Abstract. The maximum diversity problem (MDP) consists of identifying optimally diverse subsets of elements from some larger collection. The selection of elements is based on the d...
Geiza C. Silva, Luiz Satoru Ochi, Simone L. Martin...
137
Voted
ECBS
2003
IEEE
95views Hardware» more  ECBS 2003»
15 years 10 months ago
FMC: An Approach Towards Architecture-Centric System Development
The architectural level plays a major role in the engineering of computer based systems. Having proper means for representing the architecture of a system is a crucial element of ...
Frank Keller, Siegfried Wendt