Sciweavers

1734 search results - page 309 / 347
» What works
Sort
View
PSSE
2004
Springer
14 years 2 months ago
Developing and Reasoning About Probabilistic Programs in pGCL
“demonic” nondeterminism, representing abstraction from (or ignorance of) which of two program fragments will be executed. By introducing probabilistic nondeterminism into GCL,...
Annabelle McIver, Carroll Morgan
SEMWEB
2004
Springer
14 years 2 months ago
Towards a Symptom Ontology for Semantic Web Applications
As the use of Semantic Web ontologies continues to expand there is a growing need for tools that can validate ontological consistency and provide guidance in the correction of dete...
Kenneth Baclawski, Christopher J. Matheus, Mieczys...
TCC
2004
Springer
147views Cryptology» more  TCC 2004»
14 years 2 months ago
Computational Collapse of Quantum State with Application to Oblivious Transfer
Quantum 2-party cryptography differs from its classical counterpart in at least one important way: Given blak-box access to a perfect commitment scheme there exists a secure 1−2...
Claude Crépeau, Paul Dumais, Dominic Mayers...
HICSS
2003
IEEE
103views Biometrics» more  HICSS 2003»
14 years 2 months ago
Trust, Trait Theory, and Collaboration in Telemedicine: A Circumplex Perspective
More than a process-automating tool, telemedicine is increasingly recognized for its ability to facilitate collaboration and knowledge creation between disparate healthcare provid...
Houghton G. Brown, Marshall Scott Poole, Thomas Le...
DIALM
2003
ACM
113views Algorithms» more  DIALM 2003»
14 years 2 months ago
Multicast time maximization in energy constrained wireless networks
We consider the problem of maximizing the lifetime of a given multicast connection in a wireless network of energyconstrained (e.g. battery-operated) nodes, by choosing ideal tran...
Patrik Floréen, Petteri Kaski, Jukka Kohone...