Sciweavers

561 search results - page 41 / 113
» An Investigation Into Computer Forensic Tools
Sort
View
ICCS
2001
Springer
15 years 6 months ago
Application Monitoring in the Grid with GRM and PROVE
GRM and PROVE were originally designed and implemented as part of the P-GRADE graphical parallel program development environment running on clusters. In the framework of the bigges...
Zoltán Balaton, Péter Kacsuk, Norber...
CORR
2007
Springer
83views Education» more  CORR 2007»
15 years 1 months ago
Time and the Prisoner's Dilemma
B This paper examinesthe integration of computational complexity into gametheoretic models. Theexample focused on is the Prisoner’s Dilemma,repeated for a finite length of time....
Yishay Mor, Jeffrey S. Rosenschein
DIS
2005
Springer
15 years 7 months ago
The Arrowsmith Project: 2005 Status Report
In the 1980s, Don Swanson proposed the concept of “undiscovered public knowledge,” and published several examples in which two disparate literatures (i.e., sets of articles hav...
Neil R. Smalheiser
FOSSACS
2003
Springer
15 years 7 months ago
An Intrinsic Characterization of Approximate Probabilistic Bisimilarity
In previous work we have investigated a notion of approximate bisimilarity for labelled Markov processes. We argued that such a notion is more realistic and more feasible to compu...
Franck van Breugel, Michael W. Mislove, Joël ...
CW
2003
IEEE
15 years 7 months ago
PRESENCE : The Sense of Believability of Inaccessible Worlds
With the development of new instruments as telecommunication, teleoperation, computer representation tools, human beings are commonly in situation to perceive and act on spaces th...
Annie Luciani, Daniela Urma, Sylvain Marliè...