Sciweavers

759 search results - page 39 / 152
» What Can Be Implemented Anonymously
Sort
View
WDAG
2009
Springer
117views Algorithms» more  WDAG 2009»
14 years 4 months ago
Elastic Transactions
This paper presents elastic transactions, a variant of the transactional model. Upon conflict detection, an elastic transaction might drop what it did so far within a separate tra...
Pascal Felber, Vincent Gramoli, Rachid Guerraoui
ICALT
2006
IEEE
14 years 4 months ago
Virtual Instructor and Pedagogical Issues
The scope of implementing a virtual instructor is to achieve enhanced learning outcomes during an autonomous training (education) sessions of a human learner. Based on the evidenc...
Avgoustos A. Tsinakos
NDSS
2006
IEEE
14 years 3 months ago
Deploying a New Hash Algorithm
The strength of hash functions such as MD5 and SHA-1 has been called into question as a result of recent discoveries. Regardless of whether or not it is necessary to move away fro...
Steven M. Bellovin, Eric Rescorla
NIME
2005
Springer
128views Music» more  NIME 2005»
14 years 3 months ago
Multi-user Instruments: Models, Examples and Promises
In this paper we study the potential and the challenges posed by multi-user instruments, as tools that can facilitate interaction and responsiveness not only between performers an...
Sergi Jordà
KR
2004
Springer
14 years 3 months ago
From Hybrid Systems to Universal Plans Via Domain Compilation
While universal plans tell a system how to reach a goal regardless of what state it is in, such plans can be too large to represent. Hybrid systems execute plans where each action...
Anthony Barrett