Sciweavers

840 search results - page 51 / 168
» Open multi-methods for c
Sort
View
105
Voted
JCSS
2007
88views more  JCSS 2007»
15 years 2 months ago
Counting lattice vectors
We consider the problem of counting the number of lattice vectors of a given length and prove several results regarding its computational complexity. We show that the problem is ...
Denis Xavier Charles
123
Voted
CN
2004
106views more  CN 2004»
15 years 2 months ago
Security applications of peer-to-peer networks
Open networks are often insecure and provide an opportunity for viruses and DDOS activities to spread. To make such networks more resilient against these kind of threats, we propo...
Vasileios Vlachos, Stephanos Androutsellis-Theotok...
146
Voted
TSE
2008
131views more  TSE 2008»
15 years 2 months ago
Enhancing an Application Server to Support Available Components
Three-tier middleware architecture is commonly used for hosting enterprise-distributed applications. Typically, the application is decomposed into three layers: front end, middle t...
Achmad I. Kistijantoro, Graham Morgan, Santosh K. ...
144
Voted
PODC
2011
ACM
14 years 5 months ago
From bounded to unbounded concurrency objects and back
We consider the power of objects in the unbounded concurrency shared memory model, where there is an infinite set of processes and the number of processes active concurrently may...
Yehuda Afek, Adam Morrison, Guy Wertheim
129
Voted
ETS
2000
IEEE
182views Hardware» more  ETS 2000»
15 years 2 months ago
Conferencing in communities of learners: examples from social history and science communication
A commonly encountered view of computer conferencing focuses on peer interaction, student empowerment and a shift in both teacher and student roles. This paper argues that this vi...
Ann C. Jones, Eileen Scanlon, Canan Tosunoglu Blak...