Sciweavers

473 search results - page 23 / 95
» Computing excluded minors
Sort
View
CORR
2008
Springer
106views Education» more  CORR 2008»
13 years 11 months ago
Distributed Algorithms for Computing Alternate Paths Avoiding Failed Nodes and Links
A recent study characterizing failures in computer networks shows that transient single element (node/link) failures are the dominant failures in large communication networks like...
Amit M. Bhosle, Teofilo F. Gonzalez
SIGCSE
2009
ACM
212views Education» more  SIGCSE 2009»
14 years 11 months ago
Using peer-led team learning to increase participation and success of under-represented groups in introductory computer science
This paper describes the implementation and evaluation of a program that uses active recruiting and peer-led team learning to try to increase the participation and success of wome...
Susan Horwitz, Susan H. Rodger, Maureen Biggers, D...
CRYPTO
2004
Springer
120views Cryptology» more  CRYPTO 2004»
14 years 4 months ago
Pseudo-signatures, Broadcast, and Multi-party Computation from Correlated Randomness
Unconditionally secure multi-party computations in general, and broadcast in particular, are impossible if any third of the players can be actively corrupted and if no additional i...
Matthias Fitzi, Stefan Wolf, Jürg Wullschlege...
IJISEC
2006
119views more  IJISEC 2006»
13 years 10 months ago
A monitoring system for detecting repeated packets with applications to computer worms
Abstract We present a monitoring system which detects repeated packets in network traffic, and has applications including detecting computer worms. It uses Bloom filters with count...
Paul C. van Oorschot, Jean-Marc Robert, Miguel Var...
NAR
2008
67views more  NAR 2008»
13 years 10 months ago
EpiToolKit - a web server for computational immunomics
Predicting the T-cell-mediated immune response is an important task in vaccine design and thus one of the key problems in computational immunomics. Various methods have been devel...
Magdalena Feldhahn, Philipp Thiel, Mathias M. Schu...