Sciweavers

1994 search results - page 241 / 399
» Limited Software Warranties
Sort
View
FSTTCS
2010
Springer
13 years 7 months ago
Lower bounds for Quantum Oblivious Transfer
Oblivious transfer is a fundamental primitive in cryptography. While perfect information theoretic security is impossible, quantum oblivious transfer protocols can limit the disho...
André Chailloux, Iordanis Kerenidis, Jamie ...
CCR
2011
13 years 4 months ago
IP geolocation databases: unreliable?
The most widely used technique for IP geolocation consists in building a database to keep the mapping between IP blocks and a geographic location. Several databases are available ...
Ingmar Poese, Steve Uhlig, Mohamed Ali Kâafa...
SIAMCO
2011
13 years 4 months ago
Consistency of Sequential Bayesian Sampling Policies
We consider Bayesian information collection, in which a measurement policy collects information to support a future decision. This framework includes ranking and selection, continu...
Peter Frazier, Warren B. Powell
SIAMCO
2011
13 years 4 months ago
Asymptotically Optimal Controls for Time-Inhomogeneous Networks
Abstract. A framework is introduced for the identification of controls for single-class timevarying queueing networks that are asymptotically optimal in the so-called uniform acce...
Milica Cudina, Kavita Ramanan
STTT
2011
161views more  STTT 2011»
13 years 4 months ago
Automating regression testing using web-based application similarities
Web-based applications are one of the most widely used types of software, and have become the backbone of many e-commerce and communications businesses. These applications are ofte...
Kinga Dobolyi, Elizabeth Soechting, Westley Weimer