Sciweavers

431 search results - page 21 / 87
» The five orders of ignorance
Sort
View
OOPSLA
1995
Springer
15 years 1 months ago
Annotating Objects for Transport to Other Worlds
In Self 4.0, people write programs by directly constructing webs of objects in a larger world of objects. But in order to save or share these programs, the objects must be moved t...
David Ungar
AINA
2006
IEEE
14 years 11 months ago
Resources availability for Peer to Peer systems
Nowadays, Peer to Peer systems are largely studied. But in order to evaluate them in a realistic way, a better knowledge of their environments is needed. In this article we focus o...
Georges Da Costa, Corine Marchand, Olivier Richard...
EVOW
2008
Springer
14 years 11 months ago
Efficient Local Search Limitation Strategies for Vehicle Routing Problems
In this paper we examine five different strategies for limiting the local search neighborhoods in the context of vehicle routing problems. The vehicle routing problem deals with th...
Yuichi Nagata, Olli Bräysy
76
Voted
SECRYPT
2008
107views Business» more  SECRYPT 2008»
14 years 11 months ago
Yet Another Secure Distance-Bounding Protocol
Distance-bounding protocols have been proposed by Brands and Chaum in 1993 in order to detect relay attacks, also known as mafia fraud. Although the idea has been introduced fiftee...
Ventzislav Nikov, Marc Vauclair
AAAI
2006
14 years 11 months ago
Probabilistic Temporal Planning with Uncertain Durations
Few temporal planners handle both concurrency and uncertain durations, but these features commonly co-occur in realworld domains. In this paper, we discuss the challenges caused b...
Mausam, Daniel S. Weld