Sciweavers

35419 search results - page 126 / 7084
» How are we doing
Sort
View
241
Voted
VL
2010
IEEE
286views Visual Languages» more  VL 2010»
15 years 2 months ago
A Debugging Perspective on End-User Mashup Programming
In recent years, systems have emerged that enable end users to “mash” together existing web services to build new web sites. However, little is known about how well end users ...
Jill Cao, Kyle Rector, Thomas H. Park, Scott D. Fl...
154
Voted
PKDD
2005
Springer
155views Data Mining» more  PKDD 2005»
15 years 9 months ago
Realistic, Mathematically Tractable Graph Generation and Evolution, Using Kronecker Multiplication
How can we generate realistic graphs? In addition, how can we do so with a mathematically tractable model that makes it feasible to analyze their properties rigorously? Real graphs...
Jure Leskovec, Deepayan Chakrabarti, Jon M. Kleinb...
MFCS
2004
Springer
15 years 9 months ago
All Superlinear Inverse Schemes Are coNP-Hard
How hard is it to invert NP-problems? We show that all superlinearly certified inverses of NP problems are coNP-hard. To do so, we develop a novel proof technique that builds dia...
Edith Hemaspaandra, Lane A. Hemaspaandra, Harald H...
131
Voted
CHI
2003
ACM
16 years 4 months ago
The evolution of buildings and implications for the design of ubiquitous domestic environments
This paper considers how we may realize future ubiquitous domestic environments. Building upon previous work on how buildings evolve by Stewart Brand, we suggest the need to broad...
Tom Rodden, Steve Benford
131
Voted
ICISC
2007
95views Cryptology» more  ICISC 2007»
15 years 5 months ago
Security-Preserving Asymmetric Protocol Encapsulation
Query-response based protocols between a client and a server such as SSL, TLS, SSH are asymmetric in the sense that the querying client and the responding server play different ro...
Raphael C.-W. Phan, Serge Vaudenay