Sciweavers

673 search results - page 91 / 135
» Request behavior variations
Sort
View
FC
2006
Springer
108views Cryptology» more  FC 2006»
13 years 11 months ago
Uncheatable Reputation for Distributed Computation Markets
Reputation systems aggregate mutual feedback of interacting peers into a "reputation" metric for each participant. This is then available to prospective service "req...
Bogdan Carbunar, Radu Sion
HYBRID
1997
Springer
13 years 11 months ago
On-Line, Reflexive Constraint Satisfaction for Hybrid Systems: First Steps
Abstract. We can achieve guaranteed constraint satisfaction of a hybrid dynamical system (which takes into account the underlying continuous dynamics) in a simple, hierarchical con...
Michael S. Branicky
VL
1995
IEEE
121views Visual Languages» more  VL 1995»
13 years 11 months ago
Buffering of Intermediate Results in Dataflow Diagrams
Buffering of intermediate results in dataflow diagrams can significantly reduce latency when a user browses these results or re-executes a diagram with slightly different inputs. ...
Allison Woodruff, Michael Stonebraker
DATE
2010
IEEE
147views Hardware» more  DATE 2010»
13 years 10 months ago
Detecting/preventing information leakage on the memory bus due to malicious hardware
An increasing concern amongst designers and integrators of military and defense-related systems is the underlying security of the individual microprocessor components that make up ...
Abhishek Das, Gokhan Memik, Joseph Zambreno, Alok ...
LWA
2008
13 years 9 months ago
An Exploratory Study of User Goals and Strategies in Podcast Search
We report on an exploratory, qualitative user study designed to identify users' goals underlying podcast search, the strategies used to gain access to podcasts, and how curre...
Jana Besser, Katja Hofmann, Martha Larson