Sciweavers

3206 search results - page 571 / 642
» How minds can be computational systems
Sort
View
P2P
2007
IEEE
165views Communications» more  P2P 2007»
14 years 4 months ago
An Information-Theoretic Framework for Analyzing Leak of Privacy in Distributed Hash Tables
An important security issue in DHT-based structured overlay networks is to provide anonymity to the storage nodes. Compromised routing tables in those DHTs leak information about ...
Souvik Ray, Zhao Zhang
CONCUR
2007
Springer
14 years 4 months ago
Timed Concurrent Game Structures
Abstract. We propose a new model for timed games, based on concurrent game structures (CGSs). Compared to the classical timed game automata of Asarin et al. [8], our timed CGSs are...
Thomas Brihaye, François Laroussinie, Nicol...
ESCIENCE
2005
IEEE
14 years 3 months ago
Sensor Networks and Grid Middleware for Laboratory Monitoring
By combining automatic environment sensing and experimental data collection with broker based messaging middleware, a system has been produced for the real-time monitoring of expe...
Jamie M. Robinson, Jeremy G. Frey, Andy J. Stanfor...
APLAS
2005
ACM
14 years 3 months ago
Calculating Polynomial Runtime Properties
Affine size-change analysis has been used for termination analysis of eager functional programming languages. The same style of analysis is also capable of compactly recording and ...
Hugh Anderson, Siau-Cheng Khoo, Stefan Andrei, Bea...
WIKIS
2005
ACM
14 years 3 months ago
Wikis in teaching and assessment: the M/Cyclopedia project
In a knowledge-based, networked economy, students leaving university need to have attained skills in collaborative and creative project-based work and to have developed critical, ...
Axel Bruns, Sal Humphreys