Sciweavers

1744 search results - page 164 / 349
» What's There to Talk About
Sort
View
CSEE
2007
Springer
14 years 5 months ago
Lab Partners: If They're Good Enough for the Natural Sciences, Why Aren't They Good Enough for Us?
Despite many professed benefits of collaboration, some computer science educators feel students need to master work individually, particularly in the courses early in the curricul...
Laurie Williams, Lucas Layman
IH
2007
Springer
14 years 4 months ago
A Graph Game Model for Software Tamper Protection
We present a probabilistic program-transformation algorithm to render a given program tamper-resistant. In addition, we suggest a model to estimate the required effort for an atta...
Nenad Dedic, Mariusz H. Jakubowski, Ramarathnam Ve...
MDAI
2007
Springer
14 years 4 months ago
A Public-Key Protocol for Social Networks with Private Relationships
Abstract. The need for protecting the privacy of relationships in social networks has recently been stressed in the literature. Conventional protection mechanisms in those networks...
Josep Domingo-Ferrer
SSS
2007
Springer
14 years 4 months ago
Self-stabilization and Virtual Node Layer Emulations
We present formal definitions of stabilization for the Timed I/O Automata (TIOA) framework, and of emulation for the timed Virtual Stationary Automata programming abstraction laye...
Tina Nolte, Nancy A. Lynch
VLDB
2007
ACM
144views Database» more  VLDB 2007»
14 years 4 months ago
A Relational Approach to Incrementally Extracting and Querying Structure in Unstructured Data
There is a growing consensus that it is desirable to query over the structure implicit in unstructured documents, and that ideally this capability should be provided incrementally...
Eric Chu, Akanksha Baid, Ting Chen, AnHai Doan, Je...