Sciweavers

264 search results - page 51 / 53
» Time Constraint Patterns for Event B Development
Sort
View
IPPS
2005
IEEE
13 years 11 months ago
On the Optimal Placement of Secure Data Objects over Internet
Secret sharing algorithms have been used for intrusion tolerance, which ensure the confidentiality, integrity and availability of critical information. However, dynamically changi...
Manghui Tu, Peng Li, Qingkai Ma, I-Ling Yen, Farok...
ICCS
2003
Springer
13 years 11 months ago
Anisotropic Convection Model for the Earth's Mantle
The paper presents a theory for modeling flow in anisotropic, viscous rock. This theory has originally been developed for the simulation of large deformation processes including t...
Hans-B. Mühlhaus, M. Cada, Louis Moresi
TASLP
2010
107views more  TASLP 2010»
13 years 15 days ago
A Robust Method to Extract Talker Azimuth Orientation Using a Large-Aperture Microphone Array
Knowing the orientation of a talker in the focal area of a large-aperture microphone array enables the development of better beamforming algorithms (to obtain higher-quality speech...
Avram Levi, Harvey F. Silverman
IEEEPACT
2008
IEEE
14 years 6 days ago
Characterizing and modeling the behavior of context switch misses
One of the essential features in modern computer systems is context switching, which allows multiple threads of execution to time-share a limited number of processors. While very ...
Fang Liu, Fei Guo, Yan Solihin, Seongbeom Kim, Abd...
SIGDOC
2005
ACM
13 years 11 months ago
User-centred design and evaluation of ubiquitous services
Theoretical and technological progress has revived the interest in the design of services for the support of co-located human-human communication and collaboration, witnessing the...
Rahat Iqbal, Janienke Sturm, Olga A. Kulyk, Jimmy ...