Sciweavers

621 search results - page 41 / 125
» Identifying the (Tele)Presence Literature
Sort
View
TCC
2005
Springer
118views Cryptology» more  TCC 2005»
14 years 1 months ago
On the Relationships Between Notions of Simulation-Based Security
Several compositional forms of simulation-based security have been proposed in the literature, including universal composability, black-box simulatability, and variants thereof. Th...
Anupam Datta, Ralf Küsters, John C. Mitchell,...
ECAI
2004
Springer
14 years 1 months ago
Postponing Branching Decisions
Abstract. Solution techniques for Constraint Satisfaction and Optimisation Problems often make use of backtrack search methods, exploiting variable and value ordering heuristics. I...
Willem Jan van Hoeve, Michela Milano
ITRUST
2004
Springer
14 years 1 months ago
Human Experiments in Trust Dynamics
In the literature, the validity of theories or models for trust is usually based on intuition and common sense. Theories and models are not often verified experimentally. The rese...
Catholijn M. Jonker, Joost J. P. Schalken, Jan The...
WCW
2004
Springer
14 years 1 months ago
Bottlenecks and Their Performance Implications in E-commerce Systems
Abstract. We present a detailed workload characterization of a multi-tiered system that hosts an e-commerce site. Using the TPC-W workload and via experimental measurements, we ill...
Qi Zhang, Alma Riska, Erik Riedel, Evgenia Smirni
WEA
2004
Springer
129views Algorithms» more  WEA 2004»
14 years 1 months ago
Experimental Comparison of Greedy Randomized Adaptive Search Procedures for the Maximum Diversity Problem
Abstract. The maximum diversity problem (MDP) consists of identifying optimally diverse subsets of elements from some larger collection. The selection of elements is based on the d...
Geiza C. Silva, Luiz Satoru Ochi, Simone L. Martin...