Sciweavers

29908 search results - page 5869 / 5982
» On the Complexity of
Sort
View
ISSRE
2010
IEEE
13 years 6 months ago
Automata-Based Verification of Security Requirements of Composite Web Services
— With the increasing reliance of complex real-world applications on composite web services assembled from independently developed component services, there is a growing need for...
Hongyu Sun, Samik Basu, Vasant Honavar, Robyn R. L...
JASIS
2010
141views more  JASIS 2010»
13 years 6 months ago
Member activities and quality of tags in a collection of historical photographs in Flickr
There is growing interest in, and an increasing number of attempts by, traditional information providers to engage social content creation and sharing communities in creating and ...
Besiki Stvilia, Corinne Jörgensen
JCM
2010
119views more  JCM 2010»
13 years 6 months ago
Evaluation of Router Implementations for Explicit Congestion Control Schemes
— Explicit congestion control schemes use router feedback to overcome limitations of the standard mechanisms of the Transmission Control Protocol (TCP). These approaches require ...
Simon Hauger, Michael Scharf, Jochen Kögel, C...
JCST
2010
122views more  JCST 2010»
13 years 6 months ago
Harmonic Field Based Volume Model Construction from Triangle Soup
Surface triangle meshes and volume data are two commonly used representations of digital geometry. Converting from triangle meshes to volume data is challenging, since triangle mes...
Chao-Hui Shen, Guo-Xin Zhang, Yu-Kun Lai, Shi-Min ...
JCT
2010
83views more  JCT 2010»
13 years 6 months ago
Families of prudent self-avoiding walks
A self-avoiding walk (SAW) on the square lattice is prudent if it never takes a step towards a vertex it has already visited. Prudent walks differ from most classes of SAW that ha...
Mireille Bousquet-Mélou
« Prev « First page 5869 / 5982 Last » Next »