Sciweavers

184 search results - page 28 / 37
» Arity Raiser and its Use in Program Specialization
Sort
View
ISAAC
2005
Springer
153views Algorithms» more  ISAAC 2005»
14 years 1 months ago
Network Game with Attacker and Protector Entities
Consider an information network with harmful procedures called attackers (e.g., viruses); each attacker uses a probability distribution to choose a node of the network to damage. O...
Marios Mavronicolas, Vicky G. Papadopoulou, Anna P...
ESOP
2007
Springer
13 years 11 months ago
Scalar Outcomes Suffice for Finitary Probabilistic Testing
Abstract. The question of equivalence has long vexed research in concurrency, leading to many different denotational- and bisimulation-based approaches; a breakthrough occurred wit...
Yuxin Deng, Rob J. van Glabbeek, Carroll Morgan, C...
IADIS
2003
13 years 9 months ago
Quality Assurance in Teaching English
The issue of quality assurance has been on the agenda of distance and open teachinguniversities for many years. In such a context, the development of high quality study materials ...
Mahmoud Alimohammadi
AAAI
1996
13 years 9 months ago
Spatial Aggregation: Language and Applications
This paper describes the spatial aggregation language and its applications. Spatial aggregation comprises a framework and a mechanism for organizing computations around image-like...
Christopher Bailey-Kellogg, Feng Zhao, Kenneth Yip
CCS
2007
ACM
14 years 2 months ago
An inquiry into the nature and causes of the wealth of internet miscreants
This paper studies an active underground economy which specializes in the commoditization of activities such as credit card fraud, identity theft, spamming, phishing, online crede...
Jason Franklin, Adrian Perrig, Vern Paxson, Stefan...