Sciweavers

35419 search results - page 204 / 7084
» How are we doing
Sort
View
ICFP
2007
ACM
16 years 4 months ago
Functional pearl: the great escape or, how to jump the border without getting caught
Filinski showed that callcc and a single mutable reference cell are sufficient to express the delimited control operators shift and reset. However, this implementation interacts p...
David Herman
SAC
2009
ACM
15 years 11 months ago
Cross-organizational ERP management: how to create a successful business case?
This paper deals with the development and use of business cases in support of cross-organizational enterprise resource planning (ERP)-enabled e-business integration initiatives. I...
Silja Eckartz, Maya Daneva, Roel Wieringa, Jos van...
GLOBECOM
2009
IEEE
15 years 11 months ago
How Bad is Single-Path Routing
—This paper investigates the network performance loss of using only single-path routing when multiple paths are available. The performance metric is the aggregate utility achieve...
Meng Wang, Chee Wei Tan, Ao Tang, Steven H. Low
PET
2009
Springer
15 years 11 months ago
Vida: How to Use Bayesian Inference to De-anonymize Persistent Communications
We present the Vida family of abstractions of anonymous communication systems, model them probabilistically and apply Bayesian inference to extract patterns of communications and u...
George Danezis, Carmela Troncoso
FSE
2007
Springer
104views Cryptology» more  FSE 2007»
15 years 10 months ago
How to Enrich the Message Space of a Cipher
Abstract. Given (deterministic) ciphers E and E that can encipher messages of l and n bits, respectively, we construct a cipher E∗ = XLS[E, E] that can encipher messages of l + s...
Thomas Ristenpart, Phillip Rogaway