Sciweavers

4281 search results - page 705 / 857
» How to Disembed a Program
Sort
View
JDFP
2006
139views more  JDFP 2006»
15 years 2 months ago
Discovering Hidden Evidence
Over the past decade, the advancement of a myriad of methods, techniques and technologies to conceal digital evidence and covertly communicate have increased at an alarming rate. I...
Chet Hosmer
ECCC
2007
122views more  ECCC 2007»
15 years 2 months ago
Infeasibility of Instance Compression and Succinct PCPs for NP
The OR-SAT problem asks, given Boolean formulae φ1, . . . , φm each of size at most n, whether at least one of the φi’s is satisfiable. We show that there is no reduction fr...
Lance Fortnow, Rahul Santhanam
120
Voted
JOT
2006
75views more  JOT 2006»
15 years 2 months ago
Porting the .NET Compact Framework to Symbian Phones
As a result of the increasing availability and processing capacity offered by portable devices, it is important for software providers to offer mobile services that seamlessly int...
Frank Siegemund, Robert Sugar, Alain Gefflaut, Fri...
NETWORK
2008
139views more  NETWORK 2008»
15 years 2 months ago
Composing semantic services in open sensor-rich environments
Consider a scenario where Jane is at an airport. She wants to find a restaurant with healthy food and short waiting time on the way to her terminal. The airport can provide such s...
Jie Liu, Feng Zhao
115
Voted
OCLC
2008
86views more  OCLC 2008»
15 years 2 months ago
Those who don't look don't find: disciplinary considerations in repository advocacy
Purpose of this paper By describing some of the often ignored aspects of repository advocacy, such as disciplinary differences and how these might affect the adoption of a particu...
Danny Kingsley