Sciweavers

3108 search results - page 175 / 622
» The Elements of Computer Credibility
Sort
View
ICALP
2007
Springer
15 years 11 months ago
Deterministic History-Independent Strategies for Storing Information on Write-Once Memories
Motivated by the challenging task of designing “secure” vote storage mechanisms, we study information storage mechanisms that operate in extremely hostile environments. In suc...
Tal Moran, Moni Naor, Gil Segev
EDOC
2006
IEEE
15 years 11 months ago
Business Continuity Model. Regeneration System for Manufacturing Components
At present, with the expansion of information technologies at the industry, it is vital to implant proactive, self-managed systems that ensure continuous operation and, therefore,...
Diego Marcos-Jorquera, Francisco Maciá P&ea...
ESCIENCE
2006
IEEE
15 years 11 months ago
User Programmable Virtualized Networks
This paper introduces the concept of a User Programmable Virtualized Network, which allows networks to deliver application specific services using network element components that ...
Robert J. Meijer, Rudolf J. Strijkers, Leon Gomman...
146
Voted
ICMCS
2006
IEEE
175views Multimedia» more  ICMCS 2006»
15 years 11 months ago
Bringing the Wiki Collaboration Model to the Tabletop World
We present an interactive workspace that integrates wiki collaboration in knowledge-building activities with face-to-face scenarios like brainstorming or problem solving sessions....
Stefano Baraldi, Alberto Del Bimbo, Alessandro Val...
AAIM
2006
Springer
94views Algorithms» more  AAIM 2006»
15 years 11 months ago
Some Basics on Tolerances
In this note we deal with sensitivity analysis of combinatorial optimization problems and its fundamental term, the tolerance. For three classes of objective functions (Σ, Π, MA...
Boris Goldengorin, Gerold Jäger, Paul Molitor