Sciweavers

7522 search results - page 1079 / 1505
» Spacing memetic algorithms
Sort
View
STOC
2007
ACM
101views Algorithms» more  STOC 2007»
16 years 5 months ago
Toward a general theory of quantum games
We study properties of quantum strategies, which are complete specifications of a given party's actions in any multiple-round interaction involving the exchange of quantum in...
Gus Gutoski, John Watrous
STOC
2003
ACM
102views Algorithms» more  STOC 2003»
16 years 5 months ago
Some 3CNF properties are hard to test
For a Boolean formula on n variables, the associated property P is the collection of n-bit strings that satisfy . We study the query complexity of tests that distinguish (with hig...
Eli Ben-Sasson, Prahladh Harsha, Sofya Raskhodniko...
STOC
2001
ACM
122views Algorithms» more  STOC 2001»
16 years 5 months ago
One-dimensional quantum walks
In this paper we analyze the behavior of quantum random walks. In particular we present several new results for the absorption probabilities in systems with both one and two absor...
Andris Ambainis, Eric Bach, Ashwin Nayak, Ashvin V...
OSDI
2002
ACM
16 years 5 months ago
The Effectiveness of Request Redirection on CDN Robustness
It is becoming increasingly common to construct network services using redundant resources geographically distributed across the Internet. Content Distribution Networks are a prim...
Limin Wang, Vivek S. Pai, Larry L. Peterson
VLDB
2007
ACM
161views Database» more  VLDB 2007»
16 years 4 months ago
Proof-Infused Streams: Enabling Authentication of Sliding Window Queries On Streams
As computer systems are essential components of many critical commercial services, the need for secure online transactions is now becoming evident. The demand for such application...
Feifei Li, Ke Yi, Marios Hadjieleftheriou, George ...
« Prev « First page 1079 / 1505 Last » Next »