Sciweavers

2435 search results - page 191 / 487
» Intellexer Question Answering
Sort
View
IPPS
2006
IEEE
15 years 10 months ago
Fault and intrusion tolerance of wireless sensor networks
The following three questions should be answered in developing new topology with more powerful ability to tolerate node-failure in wireless sensor network. First, what is node-fai...
Liang-min Wang, Jianfeng Ma, Chao Wang, A. C. Kot
GIR
2006
ACM
15 years 10 months ago
Range-capable Distributed Hash Tables
In this paper, we present a novel indexing data structure called RDHT (Range capable Distributed Hash Table) derived from skip lists and specifically designed for storing and retr...
Alessandro Soro, Cristian Lai
AUIC
2005
IEEE
15 years 9 months ago
Evaluation of Two Textual Programming Notations for Children
Many researchers have developed many programming environments for children. Typically each of these environments contains its own programming notation ranging from computer code t...
Timothy N. Wright, Andy Cockburn
COCO
2005
Springer
96views Algorithms» more  COCO 2005»
15 years 9 months ago
A Geometric Approach to Information-Theoretic Private Information Retrieval
A t-private private information retrieval (PIR) scheme allows a user to retrieve the ith bit of an n-bit string x replicated among k servers, while any coalition of up to t server...
David P. Woodruff, Sergey Yekhanin
EPIA
2005
Springer
15 years 9 months ago
Reducing Propositional Theories in Equilibrium Logic to Logic Programs
The paper studies reductions of propositional theories in equilibrium logic to logic programs under answer set semantics. Specifically we are concerned with the question of how to...
Pedro Cabalar, David Pearce, Agustín Valver...