Sciweavers

14235 search results - page 2836 / 2847
» Is computer science science
Sort
View
121
Voted
IPL
2010
98views more  IPL 2010»
15 years 1 months ago
Distinguishing attacks on stream ciphers based on arrays of pseudo-random words
In numerous modern stream ciphers, the internal state consists of a large array of pseudo-random words, and the output key-stream is a relatively simple function of the state. In ...
Nathan Keller, Stephen D. Miller
111
Voted
ISF
2010
109views more  ISF 2010»
15 years 1 months ago
Collaborative systems development in disaster relief: The impact of multi-level governance
Disaster management information systems for international humanitarian relief are developed in contexts involving local, national and inter-governmental organizations together with...
Edgar A. Maldonado, Carleen F. Maitland, Andrea Ho...
JOI
2010
109views more  JOI 2010»
15 years 1 months ago
Citing-side normalization of journal impact: A robust variant of the Audience Factor
The principle of a new type of impact measure was introduced recently, called the "audience factor" (AF). It is a variant of the journal impact factor where emitted cita...
Michel Zitt
KBSE
2010
IEEE
15 years 1 months ago
Solving string constraints lazily
Decision procedures have long been a fixture in program analysis, and reasoning about string constraints is a key element in many program analyses and testing frameworks. Recent ...
Pieter Hooimeijer, Westley Weimer
142
Voted
PE
2010
Springer
133views Optimization» more  PE 2010»
15 years 1 months ago
Positive Harris recurrence and diffusion scale analysis of a push pull queueing network
We consider a push pull queueing system with two servers and two types of jobs which are processed by the two servers in opposite order, with stochastic generally distributed proc...
Yoni Nazarathy, Gideon Weiss
« Prev « First page 2836 / 2847 Last » Next »