Sciweavers

1966 search results - page 379 / 394
» The Use of Models - Making MABS More Informative
Sort
View
ICS
2010
Tsinghua U.
14 years 4 months ago
Cryptography by Cellular Automata or How Fast Can Complexity Emerge in Nature?
Computation in the physical world is restricted by the following spatial locality constraint: In a single unit of time, information can only travel a bounded distance in space. A ...
Benny Applebaum, Yuval Ishai, Eyal Kushilevitz
EUROCRYPT
2004
Springer
14 years 27 days ago
Immunizing Encryption Schemes from Decryption Errors
We provide methods for transforming an encryption scheme susceptible to decryption errors into one that is immune to these errors. Immunity to decryption errors is vital when const...
Cynthia Dwork, Moni Naor, Omer Reingold
ESOP
2003
Springer
14 years 21 days ago
A Tail-Recursive Semantics for Stack Inspections
Security folklore holds that a security mechanism based on stack inspection is incompatible with a global tail call optimization policy. An implementation of such a language may ha...
John Clements, Matthias Felleisen
HICSS
2002
IEEE
106views Biometrics» more  HICSS 2002»
14 years 13 days ago
Satisfaction with Internet-Based Services
: This research develops, operationalizes, and empirically tests a model for explaining/predicting the satisfaction of customers with Internet-based services in the context of an o...
Mohamed Khalifa, Vanessa Liu
ICSE
2010
IEEE-ACM
14 years 8 days ago
Characterizing and predicting which bugs get fixed: an empirical study of Microsoft Windows
We performed an empirical study to characterize factors that affect which bugs get fixed in Windows Vista and Windows 7, focusing on factors related to bug report edits and relat...
Philip J. Guo, Thomas Zimmermann, Nachiappan Nagap...