Sciweavers

1994 search results - page 241 / 399
» Limited Software Warranties
Sort
View
162
Voted
FSTTCS
2010
Springer
15 years 3 months ago
Lower bounds for Quantum Oblivious Transfer
Oblivious transfer is a fundamental primitive in cryptography. While perfect information theoretic security is impossible, quantum oblivious transfer protocols can limit the disho...
André Chailloux, Iordanis Kerenidis, Jamie ...
CCR
2011
15 years 14 days ago
IP geolocation databases: unreliable?
The most widely used technique for IP geolocation consists in building a database to keep the mapping between IP blocks and a geographic location. Several databases are available ...
Ingmar Poese, Steve Uhlig, Mohamed Ali Kâafa...
SIAMCO
2011
15 years 12 days ago
Consistency of Sequential Bayesian Sampling Policies
We consider Bayesian information collection, in which a measurement policy collects information to support a future decision. This framework includes ranking and selection, continu...
Peter Frazier, Warren B. Powell
SIAMCO
2011
15 years 12 days ago
Asymptotically Optimal Controls for Time-Inhomogeneous Networks
Abstract. A framework is introduced for the identification of controls for single-class timevarying queueing networks that are asymptotically optimal in the so-called uniform acce...
Milica Cudina, Kavita Ramanan
STTT
2011
161views more  STTT 2011»
15 years 12 days ago
Automating regression testing using web-based application similarities
Web-based applications are one of the most widely used types of software, and have become the backbone of many e-commerce and communications businesses. These applications are ofte...
Kinga Dobolyi, Elizabeth Soechting, Westley Weimer