Sciweavers

1195 search results - page 131 / 239
» What, Where
Sort
View
MHCI
2009
Springer
14 years 4 months ago
Mobile phone web browsing: a study on usage and usability of the mobile web
Browsing the Web on mobile phones has finally hit the mass. The visualization of websites on latest mobile phone models comes close to what we are used from desktop computers. Tai...
Grischa Schmiedl, Markus Seidl, Klaus Temper
PDCAT
2009
Springer
14 years 4 months ago
Analytical Study of Adversarial Strategies in Cluster-based Overlays
Abstract—Awerbuch and Scheideler have shown that peerto-peer overlays networks can survive Byzantine attacks only if malicious nodes are not able to predict what will be the topo...
Emmanuelle Anceaume, Francisco V. Brasileiro, Roma...
SACRYPT
2009
Springer
150views Cryptology» more  SACRYPT 2009»
14 years 4 months ago
Information Theoretically Secure Multi Party Set Intersection Re-visited
We re-visit the problem of secure multiparty set intersection in information theoretic settings. In [16], Li et.al have proposed a protocol for multiparty set intersection problem...
Arpita Patra, Ashish Choudhary, C. Pandu Rangan
SAT
2009
Springer
113views Hardware» more  SAT 2009»
14 years 4 months ago
Clause-Learning Algorithms with Many Restarts and Bounded-Width Resolution
Abstract. We offer a new understanding of some aspects of practical SAT-solvers that are based on DPLL with unit-clause propagation, clause-learning, and restarts. On the theoreti...
Albert Atserias, Johannes Klaus Fichte, Marc Thurl...
ISSTA
2009
ACM
14 years 4 months ago
Analyzing singularity channel contracts
This paper presents techniques for analyzing channel contract specifications in Microsoft Research’s Singularity operating system. A channel contract is a state machine that sp...
Zachary Stengel, Tevfik Bultan