Sciweavers

11345 search results - page 1780 / 2269
» Foundations of Computer Science
Sort
View
HICSS
2008
IEEE
106views Biometrics» more  HICSS 2008»
15 years 11 months ago
Of Paper Trails and Voter Receipts
The Internet pervades virtually every aspect of our daily lives, and it seems there is no area that is immune from computing solutions. Computers can do things faster, with greate...
Alec Yasinsac, Matt Bishop
118
Voted
HICSS
2008
IEEE
86views Biometrics» more  HICSS 2008»
15 years 11 months ago
Overcoming Impediments to Cell Phone Forensics
: Cell phones are an emerging but rapidly growing area of computer forensics. While cell phones are becoming more like desktop computers functionally, their organization and operat...
Wayne Jansen, Aurélien Delaitre, Ludovic Mo...
IPPS
2008
IEEE
15 years 11 months ago
Implementing an industrial-strength academic cyberinfrastructure at Purdue University
Purdue University operates one of the largest cycle recovery systems in existence in academia based on the Condor workload management system. This system represents a valuable and...
Preston M. Smith, Thomas J. Hacker, C. X. Song
TPHOL
2008
IEEE
15 years 11 months ago
Certifying a Termination Criterion Based on Graphs, without Graphs
Although graphs are very common in computer science, they are still very difficult to handle for proof assistants as proving properties of graphs may require heavy computations. T...
Pierre Courtieu, Julien Forest, Xavier Urbain
HICSS
2007
IEEE
141views Biometrics» more  HICSS 2007»
15 years 11 months ago
Second-Best Combinatorial Auctions - The Case of the Pricing-Per-Column Mechanism
One of the main contributions of classical mechanism design is the derivation of the Groves mechanisms. The class of Groves mechanisms are the only mechanisms that are strategy-pr...
Dirk Neumann, Björn Schnizler, Ilka Weber, Ch...
« Prev « First page 1780 / 2269 Last » Next »