Sciweavers

2427 search results - page 478 / 486
» Survivability Computation of Networked Information Systems
Sort
View
95
Voted
GECCO
2007
Springer
177views Optimization» more  GECCO 2007»
15 years 5 months ago
Takeover times on scale-free topologies
The topological properties of a network directly impact the flow of information through a system. In evolving populations, the topology of inter-individual interactions affects th...
Joshua L. Payne, Margaret J. Eppstein
104
Voted
ACMICEC
2004
ACM
148views ECommerce» more  ACMICEC 2004»
15 years 5 months ago
A secure and private clarke tax voting protocol without trusted authorities
Electronic voting has become one of the most popular activities over the Internet. Security and privacy are always regarded as crucial factors in electronic voting system design. ...
Changjie Wang, Ho-fung Leung
NAR
2006
177views more  NAR 2006»
14 years 11 months ago
PUMA2 - grid-based high-throughput analysis of genomes and metabolic pathways
The PUMA2 system (available at http://compbio.mcs. 10 anl.gov/puma2) is an interactive, integrated bioinformatics environment for high-throughput genetic sequence analysis and met...
Natalia Maltsev, Elizabeth M. Glass, Dinanath Sula...
79
Voted
LANC
2009
ACM
158views Education» more  LANC 2009»
15 years 6 months ago
Enhancements to the opinion model for video-telephony applications
In this paper, we show how the proposed model in ITU-T Recommendation G.1070 “Opinion model for video-telephony applications” cannot model properly the perceptual video qualit...
Jose Joskowicz, José Carlos López-Ar...
DRMTICS
2005
Springer
15 years 5 months ago
The Australian Sony PlayStation Case: How Far Will Anti-circumvention Law Reach in the Name of DRM?
This chapter overviews the legal issues arising from the modification of the Sony PlayStation console under Australian Copyright Law - the so called anti-circumvention provisions....
Brian Fitzgerald