Sciweavers

1644 search results - page 118 / 329
» Finding Dominators in Practice
Sort
View
ICTAI
1996
IEEE
15 years 7 months ago
Forward-Tracking: A Technique for Searching Beyond Failure
In many applications, such as decision support, negotiation, planning, scheduling, etc., one needs to express requirements that can only be partially satisfied. In order to expres...
Elena Marchiori, Massimo Marchiori, Joost N. Kok
109
Voted
CONEXT
2007
ACM
15 years 7 months ago
Multipath live streaming via TCP: scheme, performance and benefits
Motivated by the wide use of TCP for streaming in practice and the increasing availability of multipath between end hosts, we study multipath live streaming via TCP in this paper....
Bing Wang, Wei Wei, Zheng Guo, Donald F. Towsley
91
Voted
COOPIS
2004
IEEE
15 years 7 months ago
Classification and Analysis of Distributed Event Filtering Algorithms
Publish/subscribe middleware provides efficient support for loosely coupled communication in distributed systems. A number of different distributed message-filtering algorithms hav...
Sven Bittner, Annika Hinze
FSE
2006
Springer
114views Cryptology» more  FSE 2006»
15 years 7 months ago
Cryptanalysis of the Full HAVAL with 4 and 5 Passes
Abstract. HAVAL is a cryptographic hash function with variable digest size proposed by Zheng, Pieprzyk and Seberry in 1992. It has three variants, 3-, 4-, and 5-pass HAVAL. Previou...
Hongbo Yu, Xiaoyun Wang, Aaram Yun, Sangwoo Park
INTERACT
2007
15 years 4 months ago
The Challenges of Creating Connections and Raising Awareness: Experience from UCLIC
With current disciplinary structures and academic priorities, Human– Computer Interaction faces ongoing challenges: is it a discipline in its own right, or simply a sub-disciplin...
Ann Blandford, Rachel Benedyk, Nadia Berthouze, An...