Sciweavers

10568 search results - page 483 / 2114
» Computer Intelligence and Formalization
Sort
View
CCS
2010
ACM
15 years 11 months ago
Secure provenance: the essential of bread and butter of data forensics in cloud computing
Secure provenance that records ownership and process history of data objects is vital to the success of data forensics in cloud computing, yet it is still a challenging issue toda...
Rongxing Lu, Xiaodong Lin, Xiaohui Liang, Xuemin (...
160
Voted
ENTCS
2006
136views more  ENTCS 2006»
15 years 5 months ago
Classically-controlled Quantum Computation
It is reasonable to assume that quantum computations take place under the control of the classical world. For modelling this standard situation, we introduce a Classically-control...
Simon Perdrix, Philippe Jorrand
FMSD
2002
81views more  FMSD 2002»
15 years 4 months ago
A Notation and Logic for Mobile Computing
Abstract. We de ne a concurrent mobile system as one where independently executing components may migrate through some space during the course of the computation, and where the pat...
Gruia-Catalin Roman, Peter J. McCann
138
Voted
IJACTAICIT
2010
146views more  IJACTAICIT 2010»
15 years 2 months ago
Modeling and Simulation of a Pervasive Multimodal Multimedia Computing System for Visually-Impaired Users
Using multimodality in a computing system is advantageous in the sense that it makes computing more accessible to a wide range of users including those with impairments. Our work ...
Ali Awde, Moeiz Miraoui, Chakib Tadj, Yacine Belli...
ATAL
2009
Springer
15 years 11 months ago
Agent programming with temporally extended goals
In planning as well as in other areas, temporal logic has been used to specify so-called temporally extended goals. Temporally extended goals refer to desirable sequences of state...
Koen V. Hindriks, Wiebe van der Hoek, M. Birna van...