Sciweavers

1799 search results - page 263 / 360
» Design considerations for MRAM
Sort
View
DRM
2006
Springer
15 years 8 months ago
Proteus: virtualization for diversified tamper-resistance
Despite huge efforts by software providers, software protection mechanisms are still broken on a regular basis. Due to the current distribution model, an attack against one copy o...
Bertrand Anckaert, Mariusz H. Jakubowski, Ramarath...
125
Voted
ECAI
2006
Springer
15 years 8 months ago
A Client/Server User-Based Collaborative Filtering Algorithm: Model and Implementation
Abstract. This paper describes a new way of implementing an intelligent web caching service, based on an analysis of usage. Since the cache size in software is limited, and the sea...
Sylvain Castagnos, Anne Boyer
153
Voted
EDUTAINMENT
2006
Springer
15 years 8 months ago
Effects of Guided and Unguided Style Learning on User Attention in a Virtual Environment
Abstract. In this paper, we investigated the effects of guided and unguided style VR learning on user attention and retained knowledge. We conducted a study where users performed g...
Jayoung J. Goo, Kyoung Shin Park, Moonhoen Lee, Ji...
ESA
2006
Springer
77views Algorithms» more  ESA 2006»
15 years 8 months ago
Negative Examples for Sequential Importance Sampling of Binary Contingency Tables
The sequential importance sampling (SIS) algorithm has gained considerable popularity for its empirical success. One of its noted applications is to the binary contingency tables p...
Ivona Bezáková, Alistair Sinclair, D...
127
Voted
EUC
2006
Springer
15 years 8 months ago
Impact of Node Cheating on Gossip-Based Protocol
Gossip-based protocol has been widely adopted by many large-scale multicast applications. In this paper, we study the impact of node cheating on decentralized gossip-based protocol...
Nan Zhang, Yuanchun Shi, Bin Chang