Sciweavers

1296 search results - page 95 / 260
» Multiplicative Background Risk
Sort
View
CN
2006
107views more  CN 2006»
15 years 1 months ago
Sub-graph routing: A generalized fault-tolerant strategy for link failures in WDM optical networks
Single- and multiple-link failure resilience are of critical importance in survivable wavelength division multiplexed (WDM) optical network design. Networks are not made up simply...
Michael T. Frederick, Pallab Datta, Arun K. Somani
NETWORK
2008
106views more  NETWORK 2008»
15 years 27 days ago
Toward internet-wide multipath routing
The Internet would be more efficient and robust if routers could flexibly divide traffic over multiple paths. Often, having one or two extra paths is sufficient for customizing pa...
Jiayue He, Jennifer Rexford
TITB
2008
124views more  TITB 2008»
15 years 26 days ago
Miniature in vivo Robots for Remote and Harsh Environments
Abstract--Long-term human space exploration will require contingencies for emergency medical procedures including some capability to perform surgery. The ability to perform minimal...
Mark Rentschler, Stephen R. Platt, Kyle R. Berg, J...
123
Voted
COMPSEC
2004
105views more  COMPSEC 2004»
15 years 24 days ago
Rico: a security proxy for mobile code
Security technology suitable for the burgeoning embedded system market has not been widespread. Untrusted code downloaded from the Internet poses numerous security risks due to th...
Yougang Song, Brett D. Fleisch
IJHCI
2010
110views more  IJHCI 2010»
14 years 11 months ago
Images of Usability
The term usability is ubiquitous in human-computer interaction, so much so that it is commonly used without definition. Rather than one established meaning of usability, there are,...
Morten Hertzum