Sciweavers

7596 search results - page 177 / 1520
» Challenges in forensic computing
Sort
View
128
Voted
JCS
2010
112views more  JCS 2010»
15 years 2 months ago
Inductive trace properties for computational security
Protocol authentication properties are generally trace-based, meaning that authentication holds for the protocol if authentication holds for individual traces (runs of the protoco...
Arnab Roy, Anupam Datta, Ante Derek, John C. Mitch...
144
Voted
GI
2010
Springer
15 years 1 months ago
Cloud Computing for Autonomous Control in Logistics
Abstract: Logistics processes in a globalised economy are increasingly complex, dynamic, and distributed. These properties pose major challenges for logistics planning and control....
Arne Schuldt, Karl Hribernik, Jan D. Gehrke, Klaus...
111
Voted
IFIPTCS
2010
15 years 1 months ago
Deterministic Computations in Time-Varying Graphs: Broadcasting under Unstructured Mobility
Most highly dynamic infrastructure-less networks have in common that the assumption of connectivity does not necessarily hold at a given instant. Still, communication routes can be...
Arnaud Casteigts, Paola Flocchini, Bernard Mans, N...
160
Voted
JMLR
2010
162views more  JMLR 2010»
14 years 10 months ago
A Surrogate Modeling and Adaptive Sampling Toolbox for Computer Based Design
An exceedingly large number of scientific and engineering fields are confronted with the need for computer simulations to study complex, real world phenomena or solve challenging ...
Dirk Gorissen, Ivo Couckuyt, Piet Demeester, Tom D...
178
Voted
VLUDS
2010
212views Visualization» more  VLUDS 2010»
14 years 10 months ago
Open Problems in Computational Steering of Massive Parallel Unstructured Grid Based CFD Simulations
Traditionally, analysis of flow fields resulting from computational fluid dynamics (CFD) calculations is a sequential process. The flow area defined by surrounding geometry is tes...
Christian Wagner