Sciweavers

6660 search results - page 71 / 1332
» Highly-Available Application Integration
Sort
View
CCS
2005
ACM
15 years 3 months ago
Applications of secure electronic voting to automated privacy-preserving troubleshooting
Recent work [27, 15] introduced a novel peer-to-peer application that leverages content sharing and aggregation among the peers to diagnose misconfigurations on a desktop PC. Thi...
Qiang Huang, David Jao, Helen J. Wang
IVC
2008
71views more  IVC 2008»
14 years 10 months ago
Topological triangle characterization with application to object detection from images
A novel mathematical framework inspired on Morse Theory for topological triangle characterization in 2D meshes is introduced that is useful for applications involving the creation...
Luis Gustavo Nonato, Mario A. S. Lizier, J. Batist...
ECBS
2003
IEEE
84views Hardware» more  ECBS 2003»
15 years 3 months ago
Model-Integrated Design Toolset for Polymorphous Computer-Based Systems
Polymorphous computer-based systems are systems in which the CPU architecture “morphs” or changes shape to meet the requirements of the application. Optimized and efficient de...
Brandon Eames, Ted Bapty, Ben Abbott, Sandeep Neem...
EI
2006
71views more  EI 2006»
14 years 10 months ago
DECOS: an integrated time-triggered architecture
Roman Obermaisser, Philipp Peti, Bernhard Huber, C...
DEXA
2005
Springer
90views Database» more  DEXA 2005»
15 years 3 months ago
Transaction Management with Integrity Checking
Abstract. Database integrity constraints, understood as logical conditions that must hold for any database state, are not fully supported by current database technology. It is typi...
Davide Martinenghi, Henning Christiansen