Sciweavers

497 search results - page 3 / 100
» Spies among us
Sort
View
JC
2000
89views more  JC 2000»
13 years 7 months ago
Weakly Computable Real Numbers
The Turing degree of a real number x is defined as the Turing degree of its binary expansion. This definition is quite natural and robust. In this paper we discuss some basic degr...
Klaus Ambos-Spies, Klaus Weihrauch, Xizhong Zheng
SP
2008
IEEE
115views Security Privacy» more  SP 2008»
13 years 7 months ago
Compromising Reflections-or-How to Read LCD Monitors around the Corner
We present a novel eavesdropping technique for spying at a distance on data that is displayed on an arbitrary computer screen, including the currently prevalent LCD monitors. Our ...
Michael Backes, Markus Dürmuth, Dominique Unr...
IEPOL
2008
57views more  IEPOL 2008»
13 years 6 months ago
Interconnection and competition among asymmetric networks in the Internet backbone market
We examine the interrelation between interconnection and competition in the Internet backbone market. Networks that are asymmetric in size choose among different interconnection r...
Eric Jahn, Jens Prüfer
AGENTCL
2003
Springer
14 years 25 days ago
Resolving Commitments among Autonomous Agents
Commitments are a powerful representation for modeling multiagent interactions. Previous approaches have considered the semantics of commitments and how to check compliance with th...
Ashok U. Mallya, Pinar Yolum, Munindar P. Singh
WSTFEUS
2003
IEEE
14 years 26 days ago
uBlocks: Enabling Hand-made Distributed Application Among Ubiquitous Embedded Devices
Increase of future appliances at home environment causes confusion with less computer-skilled users. Consequently, embedded-hardware could prevent us from recognizing all of them ...
Masayuki Iwai, Jin Nakazawa, Hideyuki Tokuda