Sciweavers

5948 search results - page 274 / 1190
» Computing Robust Counter-Strategies
Sort
View
CCGRID
2009
IEEE
15 years 11 months ago
GenLM: License Management for Grid and Cloud Computing Environments
—Software license management allows independent software vendors (ISVs) to control the access of their products. It is a fundamental part of the ISVs’ business strategy. A wide...
Mathias Dalheimer, Franz-Josef Pfreundt
ISSAC
2005
Springer
119views Mathematics» more  ISSAC 2005»
15 years 9 months ago
Computing the multiplicity structure in solving polynomial systems
This paper presents a duality analysis and an algorithm for computing the multiplicity structure of a zero to a polynomial system, while the zero can be exact or approximate with ...
Barry H. Dayton, Zhonggang Zeng
IPPS
2003
IEEE
15 years 9 months ago
Trust Modeling for Peer-to-Peer Based Computing Systems
The peer-to-peer approach to design large-scale systems has significant benefits including scalability, low cost of ownership, robustness, and ability to provide site autonomy. ...
Farag Azzedin, Muthucumaru Maheswaran
HOTI
2002
IEEE
15 years 9 months ago
Radioport: A Radio Network for Monitoring and Diagnosing Computer Systems
A radio network is described for configuring, monitoring, and diagnosing the components of a computer system. Such a network offers several advantages: (a) it improves the robustn...
Hans Eberle
IVC
2006
101views more  IVC 2006»
15 years 4 months ago
Numerical error analysis in Zernike moments computation
An exact analysis of the numerical errors being generated during the computation of the Zernike moments, by using the well-known `q-recursive' method, is attempted in this pa...
George A. Papakostas, Yiannis S. Boutalis, Constan...