Sciweavers

76 search results - page 12 / 16
» isaac 2005
Sort
View
MINENET
2005
ACM
14 years 3 months ago
Anemone: using end-systems as a rich network management platform
Enterprise networks contain hundreds, if not thousands, of cooperative end-systems. We advocate devoting a small fraction of their idle cycles, free disk space and network bandwid...
Richard Mortier, Rebecca Isaacs, Paul Barham
WWW
2005
ACM
14 years 10 months ago
Modeling the author bias between two on-line computer science citation databases
We examine the difference and similarities between two online computer science citation databases DBLP and CiteSeer. The database entries in DBLP are inserted manually while the C...
Vaclav Petricek, Ingemar J. Cox, Hui Han, Isaac G....
ISI
2005
Springer
14 years 3 months ago
Map-Mediated GeoCollaborative Crisis Management
Managing crises requires collecting geographical intelligence and making spatial decisions through collaborative efforts among multiple, distributed agencies and task groups. Crisi...
Guoray Cai, Alan M. MacEachren, Isaac Brewer, Mich...
IWANN
2005
Springer
14 years 3 months ago
A Competitive-Based Method for Determining the Number of Groups: A Clinical Application
A proper gait assessment in patients with knee or hip injuries strongly determines the diagnosis and consequently the evolution of the pathology, the quality of life of implanted p...
Antonio Sánchez, Francisco J. Vico, Santiag...
ASIACRYPT
2006
Springer
14 years 1 months ago
On the (In)security of Stream Ciphers Based on Arrays and Modular Addition
Abstract. Stream ciphers play an important role in symmetric cryptology because of their suitability in high speed applications where block ciphers fall short. A large number of fa...
Souradyuti Paul, Bart Preneel