Sciweavers

1644 search results - page 118 / 329
» Finding Dominators in Practice
Sort
View
ICTAI
1996
IEEE
14 years 1 months ago
Forward-Tracking: A Technique for Searching Beyond Failure
In many applications, such as decision support, negotiation, planning, scheduling, etc., one needs to express requirements that can only be partially satisfied. In order to expres...
Elena Marchiori, Massimo Marchiori, Joost N. Kok
CONEXT
2007
ACM
14 years 26 days ago
Multipath live streaming via TCP: scheme, performance and benefits
Motivated by the wide use of TCP for streaming in practice and the increasing availability of multipath between end hosts, we study multipath live streaming via TCP in this paper....
Bing Wang, Wei Wei, Zheng Guo, Donald F. Towsley
COOPIS
2004
IEEE
14 years 20 days ago
Classification and Analysis of Distributed Event Filtering Algorithms
Publish/subscribe middleware provides efficient support for loosely coupled communication in distributed systems. A number of different distributed message-filtering algorithms hav...
Sven Bittner, Annika Hinze
FSE
2006
Springer
114views Cryptology» more  FSE 2006»
14 years 17 days ago
Cryptanalysis of the Full HAVAL with 4 and 5 Passes
Abstract. HAVAL is a cryptographic hash function with variable digest size proposed by Zheng, Pieprzyk and Seberry in 1992. It has three variants, 3-, 4-, and 5-pass HAVAL. Previou...
Hongbo Yu, Xiaoyun Wang, Aaram Yun, Sangwoo Park
INTERACT
2007
13 years 10 months ago
The Challenges of Creating Connections and Raising Awareness: Experience from UCLIC
With current disciplinary structures and academic priorities, Human– Computer Interaction faces ongoing challenges: is it a discipline in its own right, or simply a sub-disciplin...
Ann Blandford, Rachel Benedyk, Nadia Berthouze, An...