Sciweavers

173 search results - page 6 / 35
» What's your story
Sort
View
CRYPTO
1998
Springer
109views Cryptology» more  CRYPTO 1998»
13 years 11 months ago
Self-Delegation with Controlled Propagation - or - What If You Lose Your Laptop
We introduce delegation schemes wherein a user may delegate certain rights to himself, but may not safely delegate these rights to others. In our motivating application, a user ha...
Oded Goldreich, Birgit Pfitzmann, Ronald L. Rivest
PADS
1997
ACM
13 years 11 months ago
The Dark Side of Risk (what your mother never told you about Time Warp)
This paper is a reminder of the danger of allowing \risk" when synchronizing a parallel discrete-event simulation: a simulation code that runs correctly on a serial machine m...
David M. Nicol, X. Liu
ESWS
2008
Springer
13 years 9 months ago
What's the Intention Behind Your Query? A few Observations From a Large Developer Community
We study common query intentions in a software developer network with more than one million users. Based on a large query log analysis we could identify typical search intentions a...
Alexander Löser, Wojciech M. Barczynski, Falk...
WSC
1998
13 years 8 months ago
So You Have Your Model: What to Do Next. A Tutorial on Simulation Output Analysis
Simulation models are built with the intent of studying the behavior of the real system represented by the model. However, a simulation model generates random outputs; thus, the d...
Martha A. Centeno, M. Florencia Reyes