Sciweavers

11580 search results - page 206 / 2316
» Communication vs. Computation
Sort
View
NDSS
1999
IEEE
14 years 3 months ago
Secure Password-Based Protocol for Downloading a Private Key
We present protocols that allow a user Alice, knowing only her name and password, and not carrying a smart card, to "log in to the network" from a "generic" wo...
Radia J. Perlman, Charlie Kaufman
GECCO
2007
Springer
124views Optimization» more  GECCO 2007»
14 years 2 months ago
Fitness-proportional negative slope coefficient as a hardness measure for genetic algorithms
The Negative Slope Coefficient (nsc) is an empirical measure of problem hardness based on the analysis of offspring-fitness vs. parent-fitness scatterplots. The nsc has been teste...
Riccardo Poli, Leonardo Vanneschi
GROUP
2007
ACM
14 years 2 months ago
A field study of community bar: (mis)-matches between theory and practice
Community Bar (CB) is groupware supporting informal awareness and casual interaction. CB's design was derived from three sources: prior empirical research findings concerning...
Natalia A. Romero, Gregor McEwan, Saul Greenberg
EICS
2010
ACM
13 years 8 months ago
An automated routine for menu structure optimization
We propose an automated routine for hierarchical menu structure optimization. A computer advice-giving system founded on the mathematical model of menu navigation directs the desi...
Mikhail V. Goubko, Alexander I. Danilenko
EWSN
2012
Springer
12 years 6 months ago
Low Power or High Performance? A Tradeoff Whose Time Has Come (and Nearly Gone)
Abstract. Some have argued that the dichotomy between high-performance operation and low resource utilization is false – an artifact that will soon succumb to Moore’s Law and c...
JeongGil Ko, Kevin Klues, Christian Richter, Wanja...