Sciweavers

844 search results - page 28 / 169
» aim 2004
Sort
View
EUROPAR
2004
Springer
14 years 3 months ago
A Proxy Server-Network for Real-Time Computer Games
Abstract. Computer games played over the Internet have recently become an important class of distributed applications. In this paper we present a novel proxy server-network topolog...
Jens Müller 0004, Stefan Fischer, Sergei Gorl...
EUSAI
2004
Springer
14 years 3 months ago
Modelling Context: An Activity Theory Approach
In this paper, we review different context classification systems that have been used to define elements of context. Although existing classification systems cover various types of...
Manasawee Kaenampornpan, Eamonn O'Neill
EWCBR
2004
Springer
14 years 3 months ago
Exploiting Background Knowledge when Learning Similarity Measures
The definition of similarity measures—one core component of every CBR application—leads to a serious knowledge acquisition problem if domain and application specific requirem...
Thomas Gabel, Armin Stahl
FOSAD
2004
Springer
14 years 3 months ago
A Tutorial on Physical Security and Side-Channel Attacks
Abstract. A recent branch of cryptography focuses on the physical constraints that a real-life cryptographic device must face, and attempts to exploit these constraints (running ti...
François Koeune, François-Xavier Sta...
FOSSACS
2004
Springer
14 years 3 months ago
On Term Rewriting Systems Having a Rational Derivation
Several types of term rewriting systems can be distinguished by the way their rules overlap. In particular, we define the classes of prefix, suffix, bottom-up and top-down system...
Antoine Meyer