Sciweavers

762 search results - page 138 / 153
» A study of the uniqueness of source code
Sort
View
TCC
2005
Springer
116views Cryptology» more  TCC 2005»
14 years 2 months ago
Error Correction in the Bounded Storage Model
We initiate a study of Maurer’s bounded storage model (JoC, 1992) in presence of transmission errors and perhaps other types of errors that cause different parties to have incon...
Yan Zong Ding
PPPJ
2003
ACM
14 years 2 months ago
An examination of the run-time performance of GUI creation frameworks
The graphical user interface (GUI) is an important component of many software systems. Past surveys indicate that the development of a GUI is a significant undertaking and that t...
Christopher J. Howell, Gregory M. Kapfhammer, Robe...
GECCO
2003
Springer
107views Optimization» more  GECCO 2003»
14 years 2 months ago
A Possible Mechanism of Repressing Cheating Mutants in Myxobacteria
The formation of fruiting bodies by myxobacteria colonies involves altruistic suicide by many individual bacteria and is thus vulnerable to exploitation by cheating mutants. We rep...
Ying Xiao, Winfried Just
POPL
2000
ACM
14 years 1 months ago
Authentication Primitives and Their Compilation
Adopting a programming-language perspective, we study the problem of implementing authentication in a distributed system. We define a process calculus with constructs for authent...
Martín Abadi, Cédric Fournet, George...
SIGCOMM
1996
ACM
14 years 1 months ago
Receiver-Driven Layered Multicast
State of the art, real-time, rate-adaptive, multimedia applications adjust their transmission rate to match the available network capacity. Unfortunately, this source-based rate-a...
Steven McCanne, Van Jacobson, Martin Vetterli