Sciweavers

3123 search results - page 534 / 625
» Community Cloud Computing
Sort
View
USS
2010
15 years 2 months ago
Structuring Protocol Implementations to Protect Sensitive Data
In a bid to limit the harm caused by ubiquitous remotely exploitable software vulnerabilities, the computer systems security community has proposed primitives to allow execution o...
Petr Marchenko, Brad Karp
CCR
2010
128views more  CCR 2010»
15 years 1 months ago
The 2nd workshop on active internet measurements (AIMS-2) report
On February 8-10, 2010, CAIDA hosted the second Workshop on Active Internet Measurements (AIMS-2) as part of our series of Internet Statistics and Metrics Analysis (ISMA) workshop...
kc claffy, Emile Aben, Jordan Augé, Robert ...
CI
2010
81views more  CI 2010»
15 years 1 months ago
Drama Management and Player Modeling for Interactive Fiction Games
A growing research community is working towards employing drama management components in story-based games. These components gently guide the story towards a narrative arc that imp...
Manu Sharma, Santiago Ontañón, Manis...
DEBU
2010
127views more  DEBU 2010»
15 years 1 months ago
Provenance in ORCHESTRA
Sharing structured data today requires agreeing on a standard schema, then mapping and cleaning all of the data to achieve a single queriable mediated instance. However, for setti...
Todd J. Green, Grigoris Karvounarakis, Zachary G. ...
CORR
2011
Springer
135views Education» more  CORR 2011»
14 years 11 months ago
Planning with Partial Preference Models
In many real-world planning scenarios, the users are interested in optimizing multiple objectives (such as makespan and execution cost), but are unable to express their exact trad...
Tuan A. Nguyen, Minh Binh Do, Alfonso Gerevini, Iv...