Sciweavers

1644 search results - page 21 / 329
» Finding Dominators in Practice
Sort
View
ELPUB
2007
ACM
14 years 17 days ago
A Comparison of the Blogging Practices of UK and US Bloggers
This paper describes the results of an investigation into the differences and similarities between the blogging techniques of UK and US bloggers undertaken in the winter and sprin...
Sarah Pedersen
AAAI
2008
13 years 11 months ago
Anticipatory Perceptual Simulation for Human-Robot Joint Practice: Theory and Application Study
With the aim of fluency and efficiency in human-robot teams, we have developed a cognitive architecture based on the neuro-psychological principles of anticipation and perceptual ...
Guy Hoffman, Cynthia Breazeal
OOPSLA
2009
Springer
14 years 3 months ago
The commenting practice of open source
The development processes of open source software are different from traditional closed source development processes. Still, open source software is frequently of high quality. Th...
Oliver Arafat, Dirk Riehle
IJACT
2008
101views more  IJACT 2008»
13 years 8 months ago
Practical key-recovery attack against APOP, an MD5-based challenge-response authentication
Abstract: Hash functions are used in many cryptographic constructions under various assumptions, and the practical impact of collision attacks is often unclear. In this paper, we s...
Gaëtan Leurent
FAST
2011
13 years 4 days ago
A Study of Practical Deduplication
We collected file system content data from 857 desktop computers at Microsoft over a span of 4 weeks. We analyzed the data to determine the relative efficacy of data deduplication...
Dutch T. Meyer, William J. Bolosky