Sciweavers

6480 search results - page 1258 / 1296
» Proximity Communication and Time
Sort
View
CCS
2007
ACM
14 years 1 months ago
Highly efficient techniques for network forensics
Given a history of packet transmissions and an excerpt of a possible packet payload, the payload attribution problem requires the identification of sources, destinations and the t...
Miroslav Ponec, Paul Giura, Hervé Brön...
CHI
2007
ACM
14 years 1 months ago
Follow the reader: filtering comments on slashdot
Large-scale online communities need to manage the tension between critical mass and information overload. Slashdot is a news and discussion site that has used comment rating to al...
Cliff Lampe, Erik W. Johnston, Paul Resnick
ECOWS
2007
Springer
14 years 1 months ago
A Dynamic Reconfigurable Web Service Composition Framework Using Reo Coordination Language
Web services are self-contained, modular units of application logic which provide business functionality to other applications via Internet connections. Several models have been u...
Soheil Saifipoor, Behrouz Tork Ladani, Naser Nemat...
EMNETS
2007
14 years 1 months ago
Robust node localization for wireless sensor networks
The node localization problem in Wireless Sensor Networks has received considerable attention, driven by the need to obtain a higher location accuracy without incurring a large, p...
Radu Stoleru, John A. Stankovic, Sang Hyuk Son
COCO
2010
Springer
198views Algorithms» more  COCO 2010»
14 years 1 months ago
Derandomized Parallel Repetition Theorems for Free Games
—Raz’s parallel repetition theorem [21] together with improvements of Holenstein [12] shows that for any two-prover one-round game with value at most 1 − (for ≤ 1/2), the v...
Ronen Shaltiel
« Prev « First page 1258 / 1296 Last » Next »