Sciweavers

732 search results - page 139 / 147
» What Is It Like to Be a Rat
Sort
View
CACM
2008
101views more  CACM 2008»
13 years 8 months ago
Just say 'A Class Defines a Data Type'
data type and (Java) class, asking about the relationship between them. The same students would also be unlikely to find an answer in a CS1 textbook. Some textbooks might not even ...
Chenglie Hu
CORR
2010
Springer
110views Education» more  CORR 2010»
13 years 8 months ago
(Unconditional) Secure Multiparty Computation with Man-in-the-middle Attacks
In secure multi-party computation n parties jointly evaluate an n-variate function f in the presence of an adversary which can corrupt up till t parties. All honest parties are req...
Shailesh Vaya
CORR
2010
Springer
108views Education» more  CORR 2010»
13 years 8 months ago
Securing data transfer in the cloud through introducing identification packet and UDT-authentication option field: a characteriz
The emergence of various technologies has since pushed researchers to develop new protocols that support high density data transmissions in Wide Area Networks. Many of these proto...
Danilo Valeros Bernardo, Doan B. Hoang
CORR
2008
Springer
176views Education» more  CORR 2008»
13 years 8 months ago
Analysis of Social Voting Patterns on Digg
The social Web is transforming the way information is created and distributed. Authoring tools, e.g., blog publishing services, enable users to quickly and easily publish content,...
Kristina Lerman, Aram Galstyan
DC
2010
13 years 8 months ago
A knowledge-based analysis of global function computation
Consider a distributed system N in which each agent has an input value and each communication link has a weight. Given a global function, that is, a function f whose value depends...
Joseph Y. Halpern, Sabina Petride