Sciweavers

4067 search results - page 741 / 814
» Programs for Applying Symmetries
Sort
View
ICALP
2005
Springer
14 years 2 months ago
Computational Bounds on Hierarchical Data Processing with Applications to Information Security
Motivated by the study of algorithmic problems in the domain of information security, in this paper, we study the complexity of a new class of computations over a collection of va...
Roberto Tamassia, Nikos Triandopoulos
SAC
2004
ACM
14 years 2 months ago
Web Services for E-commerce: guaranteeing security access and quality of service
Being E-commerce one of the most critical Internet application, it is fundamental to employ technologies which guarantee not only secure transactions but also an adequate quality ...
Mario Bravetti, Roberto Lucchi, Gianluigi Zavattar...
SC
2004
ACM
14 years 2 months ago
Will Moore's Law Be Sufficient?
—It seems well understood that supercomputer simulation is an enabler for scientific discoveries, weapons, and other activities of value to society. It also seems widely believed...
Erik DeBenedictis
AISC
2004
Springer
14 years 2 months ago
Algorithm-Supported Mathematical Theory Exploration: A Personal View and Strategy
Abstract. We present a personal view and strategy for algorithm-supported mathematical theory exploration and draw some conclusions for the desirable functionality of future mathem...
Bruno Buchberger
PARA
2004
Springer
14 years 2 months ago
Supporting Location-Aware Distributed Applications on Mobile Devices
ct The Wireless World Research Forum (WWRF) has identified ambient-awareness and device diversity as two key properties of applications and services in future mobile systems [1]. ...
Cristiano di Flora, Massimo Ficco, Stefano Russo