Sciweavers

9997 search results - page 206 / 2000
» The case for crowd computing
Sort
View
AAAI
1994
15 years 5 months ago
Case-Based Acquisition of User Preferences for Solution Improvement in Ill-Structured Domains
1 We have developed an approach to acquire complicated user optimization criteria and use them to guide iterative solution improvement. The eectiveness of the approach was tested ...
Katia P. Sycara, Kazuo Miyashita
FC
2010
Springer
150views Cryptology» more  FC 2010»
15 years 5 months ago
A Case Study in Ethical Decision Making Regarding Remote Mitigation of Botnets
Abstract. It is becoming more common for researchers to find themselves in a position of being able to take over control of a malicious botnet. If this happens, should they use thi...
David Dittrich, Felix Leder, Tillmann Werner
125
Voted
JCP
2007
122views more  JCP 2007»
15 years 4 months ago
Converting Group Key Agreement Protocol into Password-Based Setting - Case Study
Abstract— Converting a secure group key agreement protocol into password-based setting is not a trivial task. The security of a password-based scheme hinges on preventing diction...
Ratna Dutta
SERVICEWAVE
2010
15 years 2 months ago
Simulating Autonomic SLA Enactment in Clouds Using Case Based Reasoning
Abstract. With the emergence of Cloud Computing resources of physical machines have to be allocated to virtual machines (VMs) in an ondemand way. However, the efficient allocation ...
Michael Maurer, Ivona Brandic, Rizos Sakellariou
ECRTS
2009
IEEE
15 years 2 months ago
Precise Worst-Case Execution Time Analysis for Processors with Timing Anomalies
This paper explores timing anomalies in WCET analysis. Timing anomalies add to the complexity of WCET analysis and make it hard to apply divide-and-conquer strategies to simplify ...
Raimund Kirner, Albrecht Kadlec, Peter P. Puschner