Sciweavers

35419 search results - page 88 / 7084
» How are we doing
Sort
View
ATAL
2008
Springer
15 years 5 months ago
Do humans identify efficient strategies in structured peer-to-peer systems?
In the last years, distributed coordinator-free systems, e.g., peerto-peer systems (P2P systems), have attracted much interest among researchers and practitioners. In these system...
Stephan Schosser, Klemens Böhm, Bodo Vogt
126
Voted
RTA
2010
Springer
15 years 1 months ago
Polynomial Interpretations over the Reals do not Subsume Polynomial Interpretations over the Integers
Polynomial interpretations are a useful technique for proving termination of term rewrite systems. They come in various flavors: polynomial interpretations with real, rational and...
Friedrich Neurauter, Aart Middeldorp
87
Voted
ACL
2001
15 years 5 months ago
Underspecified Beta Reduction
For ambiguous sentences, traditional semantics construction produces large numbers of higher-order formulas, which must then be -reduced individually. Underspecified versions can ...
Manuel Bodirsky, Katrin Erk, Alexander Koller, Joa...
135
Voted
INFOCOM
2008
IEEE
15 years 10 months ago
Live Baiting for Service-Level DoS Attackers
Abstract. Denial-of-Service (DoS) attacks remain a challenging problem in the Internet. In a DoS attack the attacker is attempting to make a resource unavailable to its intended le...
Sherif M. Khattab, Sameh Gobriel, Rami G. Melhem, ...
229
Voted
POPL
2007
ACM
16 years 3 months ago
Proving that programs eventually do something good
In recent years we have seen great progress made in the area of automatic source-level static analysis tools. However, most of today's program verification tools are limited ...
Byron Cook, Alexey Gotsman, Andreas Podelski, Andr...