Sciweavers

26354 search results - page 124 / 5271
» How we refactor, and how we know it
Sort
View
JCAL
2010
101views more  JCAL 2010»
13 years 5 months ago
How East Asian classrooms may change over the next 20 years
Our schools have been experiencing three overlapping waves of technology adoption since the mid-1980s: the personal computer lab wave, the online learning wave, and the digital cl...
Tak-Wai Chan
ACNS
2009
Springer
168views Cryptology» more  ACNS 2009»
14 years 4 months ago
How to Extract and Expand Randomness: A Summary and Explanation of Existing Results
Abstract. We examine the use of randomness extraction and expansion in key agreement (KA) protocols to generate uniformly random keys in the standard model. Although existing works...
Yvonne Cliff, Colin Boyd, Juan Manuel Gonzá...
FOCS
2005
IEEE
14 years 3 months ago
How to Pay, Come What May: Approximation Algorithms for Demand-Robust Covering Problems
Robust optimization has traditionally focused on uncertainty in data and costs in optimization problems to formulate models whose solutions will be optimal in the worstcase among ...
Kedar Dhamdhere, Vineet Goyal, R. Ravi, Mohit Sing...
DMSN
2004
ACM
14 years 3 months ago
Mission-critical management of mobile sensors: or, how to guide a flock of sensors
This work addresses the problem of optimizing the deployment of sensors in order to ensure the quality of the readings of the value of interest in a given (critical) geographic re...
Goce Trajcevski, Peter Scheuermann, Hervé B...
ICCS
2003
Springer
14 years 3 months ago
Grid Service Provider: How to Improve Flexibility of Grid User Interfaces?
Poznan Supercomputing and Networking Center has been involved in continuous research concerning the development of grid environments. In the scope of the PROGRESS project we design...
Maciej Bogdanski, Michal Kosiedowski, Cezary Mazur...