Sciweavers

8135 search results - page 1592 / 1627
» network 2008
Sort
View
CCS
2008
ACM
13 years 12 months ago
Securing group key exchange against strong corruptions
When users run a group key exchange (GKE) protocol, they usually extract the key from some auxiliary (ephemeral) secret information generated during the execution. Strong corrupti...
Emmanuel Bresson, Mark Manulis
EVOW
2008
Springer
13 years 11 months ago
Discovering Several Robot Behaviors through Speciation
Abstract. This contribution studies speciation from the standpoint of evolutionary robotics (ER). A common approach to ER is to design a robot’s control system using neuro-evolut...
Leonardo Trujillo, Gustavo Olague, Evelyne Lutton,...
SODA
2008
ACM
118views Algorithms» more  SODA 2008»
13 years 11 months ago
Geodesic Delaunay triangulation and witness complex in the plane
We introduce a new feature size for bounded domains in the plane endowed with an intrinsic metric. Given a point x in a domain X, the homotopy feature size of X at x measures half...
Jie Gao, Leonidas J. Guibas, Steve Oudot, Yue Wang
WWW
2008
ACM
14 years 10 months ago
Knowledge sharing and yahoo answers: everyone knows something
Yahoo Answers (YA) is a large and diverse question-answer forum, acting not only as a medium for sharing technical knowledge, but as a place where one can seek advice, gather opin...
Lada A. Adamic, Jun Zhang, Eytan Bakshy, Mark S. A...
AGILEDC
2009
IEEE
14 years 4 months ago
Fully Distributed Scrum: Linear Scalability of Production between San Francisco and India
—The Scrum software development framework was designed for the hyperproductive state where productivity increases by 5-10 times over waterfall teams and many colocated teams have...
Jeff Sutherland, Guido Schoonheim, N. Kumar, V. Pa...
« Prev « First page 1592 / 1627 Last » Next »