Sciweavers

4850 search results - page 959 / 970
» Proof and Computation in Geometry
Sort
View
CCS
2006
ACM
15 years 2 months ago
Resiliency policies in access control
We introduce the notion of resiliency policies in the context of access control systems. Such policies require an access control system to be resilient to the absence of users. An...
Ninghui Li, Mahesh V. Tripunitara, Qihua Wang
ECTEL
2006
Springer
15 years 2 months ago
Peer-to-peer Face-to-face Collaboration
In this paper, we present a proof of concept application of a technique that is designed explicitly for face to face collaboration software architectures. The objective is to minim...
Delfina Malandrino, Ilaria Manno
ISER
1995
Springer
100views Robotics» more  ISER 1995»
15 years 2 months ago
Distributed Robotic Manipulation: Experiments in Minimalism
Minimalism pursues the following agenda: For a given robotics task, nd the minimal con guration of resources required to solve the task. Thus, minimalism attempts to reduce the re...
Karl-Friedrich Böhringer, Russell Brown, Bruc...
TAPSOFT
1995
Springer
15 years 2 months ago
Anatomy of the Pentium Bug
The Pentium computer chip’s division algorithm relies on a table from which five entries were inadvertently omitted, with the result that 1738 single precision dividenddivisor ...
Vaughan R. Pratt
COCO
1991
Springer
93views Algorithms» more  COCO 1991»
15 years 2 months ago
Relating Equivalence and Reducibility to Sparse Sets
For various polynomial-time reducibilities r, this paper asks whether being r-reducible to a sparse set is a broader notion than being r-equivalent to a sparse set. Although distin...
Eric Allender, Lane A. Hemachandra, Mitsunori Ogiw...