Sciweavers

17298 search results - page 3453 / 3460
» Abstract computing machines
Sort
View
SCIENTOMETRICS
2011
12 years 11 months ago
Effect on the journal impact factor of the number and document type of citing records: a wide-scale study
Abstract We studied the effect on journal impact factors (JIF) of citations from documents labeled as articles and reviews (usually peer reviewed) versus citations coming from othe...
Juan Miguel Campanario, Jesús Carretero, Ve...
SIAMSC
2011
85views more  SIAMSC 2011»
12 years 11 months ago
Refinement and Connectivity Algorithms for Adaptive Discontinuous Galerkin Methods
Abstract. Adaptive multiscale methods are among the many effective techniques for the numerical solution of partial differential equations. Efficient grid management is an import...
Kolja Brix, Ralf Massjung, Alexander Voss
APPROX
2011
Springer
234views Algorithms» more  APPROX 2011»
12 years 8 months ago
Streaming Algorithms with One-Sided Estimation
Abstract. We study the space complexity of randomized streaming algorithms that provide one-sided approximation guarantees; e.g., the algorithm always returns an overestimate of th...
Joshua Brody, David P. Woodruff
CRYPTO
2011
Springer
195views Cryptology» more  CRYPTO 2011»
12 years 8 months ago
Time-Lock Puzzles in the Random Oracle Model
Abstract. A time-lock puzzle is a mechanism for sending messages “to the future”. The sender publishes a puzzle whose solution is the message to be sent, thus hiding it until e...
Mohammad Mahmoody, Tal Moran, Salil P. Vadhan
CSFW
2011
IEEE
12 years 8 months ago
Local Memory via Layout Randomization
—Randomization is used in computer security as a tool to introduce unpredictability into the software infrastructure. In this paper, we study the use of randomization to achieve ...
Radha Jagadeesan, Corin Pitcher, Julian Rathke, Ja...
« Prev « First page 3453 / 3460 Last » Next »