Sciweavers

438 search results - page 44 / 88
» The forest hiding problem
Sort
View
IPPS
2003
IEEE
15 years 5 months ago
A Message Passing Interface Library for Inhomogeneous Coupled Clusters
Clusters of PC containing mostly general purpose hardware have become more and more usable for high performance computing tasks in the past few years. Clustering existing systems ...
Martin Pöppe, Silke Schuch, Thomas Bemmerl
KR
2010
Springer
15 years 4 months ago
Pushing the Limits of Reasoning over Ontologies with Hidden Content
There is currently a growing interest in techniques for hiding parts of the signature of an ontology Kh that is being reused by another ontology Kv. Towards this goal, Cuenca Grau...
Bernardo Cuenca Grau, Boris Motik
GI
2001
Springer
15 years 4 months ago
Private Information Retrieval
In e-commerce, the protection of user privacy from a server was not considered feasible until the private information retrieval (PIR) problem was stated recently. A PIR protocol a...
Dmitri Asonov
ICCCN
1998
IEEE
15 years 4 months ago
On the Vulnerabilities and Protection of OSPF Routing Protocol
This paper analyzes both the strong points and weak points of OSPF routing protocol from security perspective. On its strong points, we abstract its features of information least ...
Feiyi Wang, Shyhtsun Felix Wu
SIGCSE
1998
ACM
131views Education» more  SIGCSE 1998»
15 years 4 months ago
Animation, visualization, and interaction in CS 1 assignments
Programs that use animations or visualizations attract student interest and offer feedback that can enhance different learning styles as students work to master programming and pr...
Owen L. Astrachan, Susan H. Rodger