Sciweavers

859 search results - page 103 / 172
» The Changing Face of Cryptography
Sort
View
MCI
2001
13 years 11 months ago
In a Strange Land: modelling and understanding cyberspace
: This paper begins with a long-term view of the development of cyberspace. This includes a brief examination of the worldview of a 16th-century mapmaker and over 4000 years of dev...
Alan J. Dix
WSC
2001
13 years 11 months ago
Dispatching heuristic for wafer fabrication
As the semiconductor industry moves into the next millennium, companies increasingly will be faced with production obstacles that impede their ability to remain competitive. Effec...
Loo Hay Lee, Loon Ching Tang, Soon Chee Chan
WSC
1997
13 years 11 months ago
Why We Don't Know How To Simulate the Internet
Simulating how the global Internet data network behaves is an immensely challenging undertaking because of the network’s great heterogeneity and rapid change. The heterogeneity ...
Vern Paxson, Sally Floyd
WOA
2007
13 years 11 months ago
Expectations driven approach for Situated, Goal-directed Agents
Abstract— Situated agents engaged in open systems continually face with external events requiring adequate services and behavioral responses. In these conditions agents should be...
Michele Piunti, Cristiano Castelfranchi, Rino Falc...
CJ
2006
78views more  CJ 2006»
13 years 10 months ago
A Very Mathematical Dilemma
Mathematics is facing a dilemma at its heart: the nature of mathematical proof. We have known since Church and Turing independently showed that mathematical provability was undeci...
Alan Bundy