Sciweavers

929 search results - page 57 / 186
» On Computation and Communication with Small Bias
Sort
View
CCS
2003
ACM
14 years 1 months ago
Monitoring and early warning for internet worms
After the Code Red incident in 2001 and the SQL Slammer in January 2003, it is clear that a simple self-propagating worm can quickly spread across the Internet, infects most vulne...
Cliff Changchun Zou, Lixin Gao, Weibo Gong, Donald...
FOCS
2010
IEEE
13 years 6 months ago
The Coin Problem and Pseudorandomness for Branching Programs
The Coin Problem is the following problem: a coin is given, which lands on head with probability either 1/2 + or 1/2 - . We are given the outcome of n independent tosses of this co...
Joshua Brody, Elad Verbin
ROBIO
2006
IEEE
217views Robotics» more  ROBIO 2006»
14 years 2 months ago
Modular software architecture for teams of cooperating, heterogeneous robots
— For teams of cooperating autonomous lightweight robots with challenging dynamical locomotion properties a platform independent modular software architecture and platform indepe...
Martin Friedmann, Jutta Kiener, Sebastian Petters,...
ICICS
2005
Springer
14 years 2 months ago
Private Itemset Support Counting
Private itemset support counting (PISC) is a basic building block of various privacy-preserving data mining algorithms. Briefly, in PISC, Client wants to know the support of her i...
Sven Laur, Helger Lipmaa, Taneli Mielikäinen
IVA
2005
Springer
14 years 2 months ago
A Conversational Agent as Museum Guide - Design and Evaluation of a Real-World Application
This paper describes an application of the conversational agent Max in a real-world setting. The agent is employed as guide in a public computer museum, where he engages with visit...
Stefan Kopp, Lars Gesellensetter, Nicole C. Kr&aum...