Sciweavers

856 search results - page 133 / 172
» Dependent Types in Practical Programming
Sort
View
ICC
2007
IEEE
127views Communications» more  ICC 2007»
14 years 3 months ago
Scalable Local Area Service Discovery
— Existing methods for local area service discovery either don’t scale or rely on a trustworthy directory server; in some environments these restrictions are unacceptable or im...
Richard Black, Heimir Sverrisson, Laurent Massouli...
CRYPTO
2007
Springer
143views Cryptology» more  CRYPTO 2007»
14 years 2 months ago
A Hybrid Lattice-Reduction and Meet-in-the-Middle Attack Against NTRU
To date the NTRUEncrypt security parameters have been based on the existence of two types of attack: a meet-in-the-middle attack due to Odlyzko, and a conservative extrapolation of...
Nick Howgrave-Graham
MM
2006
ACM
135views Multimedia» more  MM 2006»
14 years 2 months ago
A real-time, multimodal biofeedback system for stroke patient rehabilitation
This paper presents a novel real-time, multi-modal biofeedback system for stoke patient therapy. The problem is important as traditional mechanisms of rehabilitation are monotonou...
Yinpeng Chen, Weiwei Xu, Richard Isaac Wallis, Har...
WISE
2005
Springer
14 years 2 months ago
Identifying Value Mappings for Data Integration: An Unsupervised Approach
The Web is a distributed network of information sources where the individual sources are autonomously created and maintained. Consequently, syntactic and semantic heterogeneity of ...
Jaewoo Kang, Dongwon Lee, Prasenjit Mitra
SIGMETRICS
2005
ACM
101views Hardware» more  SIGMETRICS 2005»
14 years 2 months ago
Fundamental bounds on the accuracy of network performance measurements
This paper considers the basic problem of “how accurate can we make Internet performance measurements”. The answer is somewhat counter-intuitive in that there are bounds on th...
Matthew Roughan