Sciweavers

4074 search results - page 217 / 815
» Defining Computational Aesthetics
Sort
View
109
Voted
ECSA
2010
Springer
15 years 27 days ago
Formal approach to security metrics.: what does "more secure" mean for you?
Security metrics are the tools for providing correct and upto-date information about a state of security. This information is essential for managing security efficiently. Although...
Leanid Krautsevich, Fabio Martinelli, Artsiom Yaut...
CORR
2010
Springer
174views Education» more  CORR 2010»
15 years 24 days ago
Cut Elimination for a Logic with Induction and Co-induction
Proof search has been used to specify a wide range of computation systems. In order to build a framework for reasoning about such specifications, we make use of a sequent calculus...
Alwen Tiu, Alberto Momigliano
83
Voted
CORR
2006
Springer
135views Education» more  CORR 2006»
15 years 22 days ago
An equilibrium model for matching impatient demand and patient supply over time
We present a simple dynamic equilibrium model for an online exchange where both buyers and sellers arrive according to a exogenously defined stochastic process. The structure of t...
Garud Iyengar, Anuj Kumar
114
Voted
GRID
2006
Springer
15 years 21 days ago
Cacheable Decentralized Groups for Grid Resource Access Control
Abstract-- Sharing data among collaborators in widely distributed systems remains a challenge due to limitations with existing methods for defining groups across administrative dom...
Jeffrey Hemmes, Douglas Thain
JMIV
2008
214views more  JMIV 2008»
15 years 20 days ago
A Network Flow Algorithm for Reconstructing Binary Images from Continuous X-rays
Tomography is a powerful technique to obtain accurate images of the interior of an object in a nondestructive way. Conventional reconstruction algorithms, such as filtered backproj...
Kees Joost Batenburg