Sciweavers

41 search results - page 4 / 9
» Deriving Concepts and Strategies from Chess Tablebases
Sort
View
139
Voted
DSN
2011
IEEE
13 years 10 months ago
Applying game theory to analyze attacks and defenses in virtual coordinate systems
—Virtual coordinate systems provide an accurate and efficient service that allows hosts on the Internet to determine latency to arbitrary hosts based on information provided by ...
Sheila Becker, Jeff Seibert, David Zage, Cristina ...
DSS
2007
231views more  DSS 2007»
14 years 10 months ago
Self-healing systems - survey and synthesis
As modern software-based systems and applications gain in versatility and functionality, the ability to manage inconsistent resources and service disparate user requirements becom...
Debanjan Ghosh, Raj Sharman, H. Raghav Rao, Shambh...
SEMWEB
2009
Springer
15 years 4 months ago
Learning Semantic Query Suggestions
An important application of semantic web technology is recognizing human-defined concepts in text. Query transformation is a strategy often used in search engines to derive querie...
Edgar Meij, Marc Bron, Laura Hollink, Bouke Huurni...
70
Voted
HICSS
2005
IEEE
163views Biometrics» more  HICSS 2005»
15 years 3 months ago
Survey of Strategic Alignment Impacts on Organizational Performance in International European Companies
act The strategic use of technology based information systems (IS/IT) is a fundamental issue for every business. This is particularly true in the case of firms that engage in inter...
Hajer Kefi, Michel Kalika
83
Voted
QEST
2010
IEEE
14 years 8 months ago
Information Hiding in Probabilistic Concurrent Systems
Information hiding is a general concept which refers to the goal of preventing an adversary to infer secret information from the observables. Anonymity and Information Flow are exa...
Miguel E. Andrés, Catuscia Palamidessi, Pet...