Sciweavers

6300 search results - page 1153 / 1260
» We have it easy, but do we have it right
Sort
View
AC
1998
Springer
15 years 28 days ago
Cellular Automata Models of Self-Replicating Systems
Abstract: Since von Neumann's seminal work around 1950, computer scientists and others have studied the algorithms needed to support self-replicating systems. Much of this wor...
James A. Reggia, Hui-Hsien Chou, Jason D. Lohn
SIGIR
2002
ACM
15 years 26 days ago
Collaborative filtering with privacy via factor analysis
Collaborative filtering (CF) is valuable in e-commerce, and for direct recommendations for music, movies, news etc. But today's systems have several disadvantages, including ...
John F. Canny
ISR
2010
14 years 11 months ago
Electronic Markets, Search Costs, and Firm Boundaries
We study how electronic markets that facilitate broader inter-firm transactions affect the vertical scope of emerging IT-enabled extended enterprises. We do so by modeling firms...
Ramesh Sankaranarayanan, Arun Sundararajan
LATINCRYPT
2010
14 years 11 months ago
Generic Attacks on Misty Schemes
Abstract. Misty schemes are classic cryptographic schemes used to construct pseudo-random permutations from 2n bits to 2n bits by using d pseudo-random permutations from n bits to ...
Valérie Nachef, Jacques Patarin, Joana Treg...
ANCS
2010
ACM
14 years 11 months ago
The case for hardware transactional memory in software packet processing
Software packet processing is becoming more important to enable differentiated and rapidly-evolving network services. With increasing numbers of programmable processor and acceler...
Martin Labrecque, J. Gregory Steffan
« Prev « First page 1153 / 1260 Last » Next »