Sciweavers

2421 search results - page 431 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
ICDCS
2008
IEEE
15 years 10 months ago
stdchk: A Checkpoint Storage System for Desktop Grid Computing
— Checkpointing is an indispensable technique to provide fault tolerance for long-running high-throughput applications like those running on desktop grids. This paper argues that...
Samer Al-Kiswany, Matei Ripeanu, Sudharshan S. Vaz...
ICRA
2008
IEEE
163views Robotics» more  ICRA 2008»
15 years 10 months ago
Dealing with laser scanner failure: Mirrors and windows
— This paper addresses the problem of laser scanner failure on mirrors and windows. Mirrors and glasses are quite common objects that appear in our daily lives. However, while la...
Shao-Wen Yang, Chieh-Chih Wang
DATE
2007
IEEE
80views Hardware» more  DATE 2007»
15 years 10 months ago
Engineering trust with semantic guardians
The ability to guarantee the functional correctness of digital integrated circuits and, in particular, complex microprocessors, is a key task in the production of secure and trust...
Ilya Wagner, Valeria Bertacco
CIA
2007
Springer
15 years 10 months ago
Trust Modeling with Context Representation and Generalized Identities
Abstract. We present a trust model extension that attempts to relax the assumptions that are currently taken by the majority of existing trust models: (i) proven identity of agents...
Martin Rehák, Michal Pechoucek
SUM
2007
Springer
15 years 10 months ago
Incomplete Statistical Information Fusion and Its Application to Clinical Trials Data
In medical clinical trials, overall trial results are highlighted in the s of papers/reports. These results are summaries of underlying statistical analysis where most of the time ...
Jianbing Ma, Weiru Liu, Anthony Hunter