Sciweavers

9049 search results - page 1767 / 1810
» The New C Standard
Sort
View
IJCAI
1989
14 years 11 months ago
Input Data Management in Real-Time AI Systems
A real-time AI system in the real world needs to monitor an immense volume of data. To do this, the system must filter out much of the incoming data. However, it must remain re­ ...
Richard Washington, Barbara Hayes-Roth
USENIX
1990
14 years 11 months ago
Implementation of the Ficus Replicated File System
As we approach nation-wide integration of computer systems, it is clear that le replication will play a key role, both to improve data availability in the face of failures, and to...
Richard G. Guy, John S. Heidemann, Wai-Kei Mak, Th...
113
Voted
ATAL
2010
Springer
14 years 10 months ago
Hybrid transitive trust mechanisms
Establishing trust amongst agents is of central importance to the development of well-functioning multi-agent systems. For example, the anonymity of transactions on the Internet c...
Jie Tang, Sven Seuken, David C. Parkes
88
Voted
CCS
2010
ACM
14 years 10 months ago
Securing wireless sensor networks against large-scale node capture attacks
Securing wireless sensor networks against node capture is a challenging task. All well-known random key pre-distribution systems, including the Eschenauer and Gligor's pionee...
Tuan Manh Vu, Reihaneh Safavi-Naini, Carey William...
DOCENG
2010
ACM
14 years 10 months ago
APEX: automated policy enforcement eXchange
: APEX: Automated Policy Enforcement eXchange Steven J. Simske, Helen Balinsky HP Laboratories HPL-2010-134 Policy, Text Analysis, Policy Server, Policy Editor, Document Systems, ...
Steven J. Simske, Helen Balinsky
« Prev « First page 1767 / 1810 Last » Next »