Sciweavers

5205 search results - page 1033 / 1041
» Tilings and model theory
Sort
View
ECCC
2010
98views more  ECCC 2010»
13 years 6 months ago
Verifying Computations with Streaming Interactive Proofs
Applications based on outsourcing computation require guarantees to the data owner that the desired computation has been performed correctly by the service provider. Methods based...
Graham Cormode, Justin Thaler, Ke Yi
ESWS
2010
Springer
13 years 6 months ago
The Semantic Gap of Formalized Meaning
Recent work in Ontology learning and Text mining has mainly focused on engineering methods to solve practical problem. In this thesis, we investigate methods that can substantially...
Sebastian Hellmann
INFOCOM
2010
IEEE
13 years 6 months ago
Know Thy Neighbor: Towards Optimal Mapping of Contacts to Social Graphs for DTN Routing
—Delay Tolerant Networks (DTN) are networks of self-organizing wireless nodes, where end-to-end connectivity is intermittent. In these networks, forwarding decisions are generall...
Theus Hossmann, Thrasyvoulos Spyropoulos, Franck L...
INFOCOM
2010
IEEE
13 years 6 months ago
Maximum Damage Malware Attack in Mobile Wireless Networks
—Malware attacks constitute a serious security risk that threatens to slow down the large scale proliferation of wireless applications. As a first step towards thwarting this se...
M. H. R. Khouzani, Saswati Sarkar, Eitan Altman
JCC
2010
103views more  JCC 2010»
13 years 6 months ago
Conformational behavior of simple furanosides studied by optical rotation
: Experimental and theoretical specific optical rotations (OR) of anhydro, epithio, and epiminoderivatives of methyl tetrofuranosides in chloroform solutions have been compared an...
Jakub Kaminský, Ivan Raich, Katerina Tomc&a...
« Prev « First page 1033 / 1041 Last » Next »