Sciweavers

897 search results - page 15 / 180
» Identity: How to name it, How to find it
Sort
View
IJAC
2000
104views more  IJAC 2000»
13 years 8 months ago
Construction of Self-Distributive Operations and Charged Braids
Starting from a certain monoid that describes the geometry of the left self-distributivity identity, we construct an explicit realization of the free left self-distributive system ...
Patrick Dehornoy
IJWBC
2006
71views more  IJWBC 2006»
13 years 8 months ago
Harnessing ICT to develop community and identity: a model for academic departments
: Universities have been early adopters of Information and Communication Technologies (ICT). However, does availability imply use? How is ICT being used by academic departments? Th...
Clara M. Chu, Jose Rodolfo Hernandez-Carrion
CJ
2002
67views more  CJ 2002»
13 years 8 months ago
Using Bloom Filters to Speed-up Name Lookup in Distributed Systems
Bloom filters make use of a "probabilistic" hash-coding method to reduce the amount of space required to store a hash set. A Bloom filter offers a trade-off between its ...
Mark C. Little, Santosh K. Shrivastava, Neil A. Sp...
SIGCOMM
2006
ACM
14 years 2 months ago
ROFL: routing on flat labels
It is accepted wisdom that the current Internet architecture conflates network locations and host identities, but there is no agreement on how a future architecture should distin...
Matthew Caesar, Tyson Condie, Jayanthkumar Kannan,...
AIM
2005
13 years 8 months ago
Semantic Integration in Text: From Ambiguous Names to Identifiable Entities
Intelligent access to information requires semantic integration of structured databases with unstructured textual resources. While the semantic integration problem has been widely...
Xin Li, Paul Morie, Dan Roth