Sciweavers

10435 search results - page 1950 / 2087
» Measuring system normality
Sort
View
73
Voted
FC
2004
Springer
89views Cryptology» more  FC 2004»
15 years 6 months ago
Electronic National Lotteries
We describe the design and implementation of secure and robust protocol and system for a national electronic lottery. Electronic lotteries at a national level are a viable cost eļ¬...
Elisavet Konstantinou, Vasiliki Liagkou, Paul G. S...
NMR
2004
Springer
15 years 6 months ago
A probabilistic approach to default reasoning
A logic is defined which in addition to propositional calculus contains several types of probabilistic operators which are applied only to propositional formulas. For every s ∈...
Miodrag Raskovic, Zoran Ognjanovic, Zoran Markovic
106
Voted
RAID
2004
Springer
15 years 6 months ago
RheoStat: Real-Time Risk Management
As the frequency of attacks faced by the average host connected to the Internet increases, reliance on manual intervention for response is decreasingly tenable. Operating system an...
Ashish Gehani, Gershon Kedem
SCOPES
2004
Springer
15 years 6 months ago
Combined Data Partitioning and Loop Nest Splitting for Energy Consumption Minimization
For mobile embedded systems, the energy consumption is a limiting factor because of today’s battery capacities. Besides the processor, memory accesses consume a high amount of en...
Heiko Falk, Manish Verma
105
Voted
CLUSTER
2003
IEEE
15 years 6 months ago
A Performance Monitor Based on Virtual Global Time for Clusters of PCs
Debugging the performance of parallel and distributed systems remains a difficult task despite the widespread use of middleware packages for automatic distribution, communication...
Michela Taufer, Thomas Stricker
« Prev « First page 1950 / 2087 Last » Next »