Sciweavers

20175 search results - page 4029 / 4035
» Is abstraction the key to computing
Sort
View
SCIENTOMETRICS
2011
12 years 11 months ago
Effect on the journal impact factor of the number and document type of citing records: a wide-scale study
Abstract We studied the effect on journal impact factors (JIF) of citations from documents labeled as articles and reviews (usually peer reviewed) versus citations coming from othe...
Juan Miguel Campanario, Jesús Carretero, Ve...
APPROX
2011
Springer
234views Algorithms» more  APPROX 2011»
12 years 8 months ago
Streaming Algorithms with One-Sided Estimation
Abstract. We study the space complexity of randomized streaming algorithms that provide one-sided approximation guarantees; e.g., the algorithm always returns an overestimate of th...
Joshua Brody, David P. Woodruff
CRYPTO
2011
Springer
195views Cryptology» more  CRYPTO 2011»
12 years 8 months ago
Time-Lock Puzzles in the Random Oracle Model
Abstract. A time-lock puzzle is a mechanism for sending messages “to the future”. The sender publishes a puzzle whose solution is the message to be sent, thus hiding it until e...
Mohammad Mahmoody, Tal Moran, Salil P. Vadhan
CSFW
2011
IEEE
12 years 8 months ago
Local Memory via Layout Randomization
—Randomization is used in computer security as a tool to introduce unpredictability into the software infrastructure. In this paper, we study the use of randomization to achieve ...
Radha Jagadeesan, Corin Pitcher, Julian Rathke, Ja...
DEXA
2011
Springer
296views Database» more  DEXA 2011»
12 years 8 months ago
A Scalable Tag-Based Recommender System for New Users of the Social Web
Abstract. Folksonomies have become a powerful tool to describe, discover, search, and navigate online resources (e.g., pictures, videos, blogs) on the Social Web. Unlike taxonomies...
Valentina Zanardi, Licia Capra
« Prev « First page 4029 / 4035 Last » Next »