Sciweavers

11547 search results - page 2176 / 2310
» Quantum computing and communication
Sort
View
CCS
2008
ACM
15 years 6 months ago
A look in the mirror: attacks on package managers
This work studies the security of ten popular package managers. These package managers use different security mechanisms that provide varying levels of usability and resilience to...
Justin Cappos, Justin Samuel, Scott M. Baker, John...
CHI
2008
ACM
15 years 6 months ago
Implicit user-adaptive system engagement in speech and pen interfaces
As emphasis is placed on developing mobile, educational, and other applications that minimize cognitive load on users, it is becoming more essential to base interface design on im...
Sharon L. Oviatt, Colin Swindells, Alexander M. Ar...
CCGRID
2006
IEEE
15 years 6 months ago
Biodiversity World: A Problem-Solving Environment for Analysing Biodiversity Patterns
In the Biodiversity World (BDW) project we have created a flexible and extensible Web Services-based Grid environment for biodiversity researchers to solve problems in biodiversity...
Jaspreet Singh Pahwa, Peter Brewer, Tim Sutton, Ch...
ICDCS
2010
IEEE
15 years 6 months ago
Opportunistic Routing for Interactive Traffic in Wireless Networks
Abstract--To take advantage of the broadcast nature of wireless communication, a number of opportunistic routing techniques have recently been proposed. In order to manage the extr...
Tianji Li, Douglas J. Leith, Lili Qiu
COCO
2005
Springer
130views Algorithms» more  COCO 2005»
15 years 6 months ago
Pseudorandom Bits for Constant Depth Circuits with Few Arbitrary Symmetric Gates
We exhibit an explicitly computable ‘pseudorandom’ generator stretching l bits into m(l) = lΩ(log l) bits that look random to constant-depth circuits of size m(l) with log m...
Emanuele Viola
« Prev « First page 2176 / 2310 Last » Next »