Sciweavers

472 search results - page 73 / 95
» Limiting Negations in Formulas
Sort
View
JSW
2008
127views more  JSW 2008»
13 years 10 months ago
A Trust Based System for Enhanced Spam Filtering
The effectiveness of current anti-spam systems is limited by the ability of spammers to adapt to filtering techniques and the lack of incentive for mail servers to filter outgoing ...
Jimmy McGibney, Dmitri Botvich
SIAMSC
2008
129views more  SIAMSC 2008»
13 years 10 months ago
Iterative Solution of Piecewise Linear Systems
The correct formulation of numerical models for free-surface hydrodynamics often requires the solution of special linear systems whose coefficient matrix is a piecewise constant fu...
Luigi Brugnano, Vincenzo Casulli
TCS
2008
13 years 10 months ago
The role of information in the cop-robber game
We investigate the role of the information available to the players on the outcome of the cops and robbers game. This game takes place on a graph and players move along the edges ...
Volkan Isler, Nikhil Karnad
CCR
1998
90views more  CCR 1998»
13 years 10 months ago
On the generation and use of TCP acknowledgments
This paper presents a simulation study of various TCP acknowledgment generation and utilization techniques. We investigate the standard version of TCP and the two standard acknowl...
Mark Allman
COMPSAC
2010
IEEE
13 years 8 months ago
Key Roles of Session State: Not against REST Architectural Style
The modern Web architecture basically follows the Representational State Transfer (REST) style. This style offers the architectural properties necessary to implement the Internetsc...
Takeru Inoue, Hiroshi Asakura, Hiroshi Sato, Noriy...