Sciweavers

201 search results - page 36 / 41
» An Authorization Logic With Explicit Time
Sort
View
SIGDOC
1997
ACM
15 years 3 months ago
Usability Studies of WWW Sites: Heuristic Evaluation vs. Laboratory Testing
This paper describes the strengths and weaknesses of two usability assessment methods frequently applied to web sites. It uses case histories of WWW usability studies conducted by...
Laurie Kantner, Stephanie Rosenbaum
FOCS
1995
IEEE
15 years 3 months ago
Disjoint Paths in Densely Embedded Graphs
We consider the following maximum disjoint paths problem (mdpp). We are given a large network, and pairs of nodes that wish to communicate over paths through the network — the g...
Jon M. Kleinberg, Éva Tardos
ICDCS
1995
IEEE
15 years 3 months ago
Specifying Weak Sets
nt formal speci cations of a new abstraction, weak sets, which can be used to alleviate high latencies when retrieving data from a wide-area information system like the World Wide...
Jeannette M. Wing, David C. Steere
IJRR
2010
185views more  IJRR 2010»
14 years 10 months ago
FISST-SLAM: Finite Set Statistical Approach to Simultaneous Localization and Mapping
The solution to the problem of mapping an environment and at the same time using this map to localize (the simultaneous localization and mapping, SLAM, problem) is a key prerequis...
Bharath Kalyan, K. W. Lee, W. Sardha Wijesoma
ATVA
2006
Springer
109views Hardware» more  ATVA 2006»
15 years 1 months ago
Proactive Leader Election in Asynchronous Shared Memory Systems
Abstract. In this paper, we give an algorithm for fault-tolerant proactive leader election in asynchronous shared memory systems, and later its formal verification. Roughly speakin...
M. C. Dharmadeep, K. Gopinath