Sciweavers

453 search results - page 78 / 91
» date 2006
Sort
View
FSE
2006
Springer
137views Cryptology» more  FSE 2006»
15 years 1 months ago
A Study of the MD5 Attacks: Insights and Improvements
MD5 is a well-known and widely-used cryptographic hash function. It has received renewed attention from researchers subsequent to the recent announcement of collisions found by Wa...
John Black, Martin Cochran, Trevor Highland
CHI
2008
ACM
15 years 3 days ago
Word usage and posting behaviors: modeling blogs with unobtrusive data collection methods
We present a large-scale analysis of the content of weblogs dating back to the release of the Blogger program in 1999. Over one million blogs were analyzed from their conception t...
Adam D. I. Kramer, Kerry Rodden
ACSW
2006
14 years 11 months ago
Grid-JQA: grid Java based quality of service management by active database
Task scheduling is an integrated component of computing. With the emergence of grid and ubiquitous computing, newer challenges have arisen in task scheduling. Unlike traditional p...
Leili Mohammad Khanli, Morteza Analoui
73
Voted
DAGSTUHL
2006
14 years 11 months ago
Decentralization and Mechanism Design for Online Machine Scheduling
We study the online version of the classical parallel machine scheduling problem to minimize the total weighted completion time from a new perspective: We assume that the data of ...
Birgit Heydenreich, Rudolf Müller, Marc Uetz
88
Voted
AMAI
2006
Springer
14 years 10 months ago
Symmetric approximate linear programming for factored MDPs with application to constrained problems
A weakness of classical Markov decision processes (MDPs) is that they scale very poorly due to the flat state-space representation. Factored MDPs address this representational pro...
Dmitri A. Dolgov, Edmund H. Durfee