Sciweavers

1242 search results - page 231 / 249
» Digital Objects as Passwords
Sort
View
ATAL
2003
Springer
15 years 2 months ago
A method for decentralized clustering in large multi-agent systems
This paper examines a method of clustering within a fully decentralized multi-agent system. Our goal is to group agents with similar objectives or data, as is done in traditional ...
Elth Ogston, Benno J. Overeinder, Maarten van Stee...
78
Voted
DRM
2003
Springer
15 years 2 months ago
Obfuscation of design intent in object-oriented applications
Protection of digital data from unauthorized access is of paramount importance. In the past several years, much research has concentrated on protecting data from the standpoint of...
Mikhail Sosonkin, Gleb Naumovich, Nasir D. Memon
91
Voted
DSVIS
2003
Springer
15 years 2 months ago
An Approach to Develop User Interfaces with Plasticity
This paper provides an approach to develop user interfaces where plasticity is considered by using several concepts, concretely our proposal is a pattern-based, component-oriented ...
Francisco Montero, Víctor López-Jaqu...
CLOUD
2010
ACM
15 years 2 months ago
A self-organized, fault-tolerant and scalable replication scheme for cloud storage
Failures of any type are common in current datacenters, partly due to the higher scales of the data stored. As data scales up, its availability becomes more complex, while differe...
Nicolas Bonvin, Thanasis G. Papaioannou, Karl Aber...
COMPGEOM
2010
ACM
15 years 2 months ago
Finding shortest non-trivial cycles in directed graphs on surfaces
Let D be a weighted directed graph cellularly embedded in a surface of genus g, orientable or not, possibly with boundary. We describe algorithms to compute a shortest non-contrac...
Sergio Cabello, Éric Colin de Verdiè...