Sciweavers

1003 search results - page 47 / 201
» Understanding Availability
Sort
View
ACSAC
2005
IEEE
15 years 3 months ago
Code Security Analysis of a Biometric Authentication System Using Automated Theorem Provers
Understanding the security goals provided by cryptographic protocol implementations is known to be difficult, since security requirements such as secrecy, integrity and authentici...
Jan Jürjens
AUIC
2005
IEEE
15 years 3 months ago
Program Comprehension: Investigating the Effects of Naming Style and Documentation
In both commercial and academic environments, software development frameworks are an important tool in the construction of industrial strength software solutions. Despite the role...
Scott Blinman, Andy Cockburn
ICAC
2005
IEEE
15 years 3 months ago
Distributed Troubleshooting Agents
Key issues to address in autonomic job recovery for cluster computing are recognizing job failure; understanding the failure sufficiently to know if and how to restart the job; an...
Charles Earl, Emilio Remolina, Jim Ong, John Brown
MM
2005
ACM
88views Multimedia» more  MM 2005»
15 years 3 months ago
LazyCut: content-aware template-based video authoring
Though there are many commercial video authoring tools available today, video authoring remains as a tedious and extremely time consuming task that often requires trained professi...
Xian-Sheng Hua, Zengzhi Wang, Shipeng Li
ATAL
2005
Springer
15 years 3 months ago
Global convergence of local agent behaviors
Many multi-agent systems seek to reconcile two apparently inconsistent constraints. The system’s overall objective is defined at a global level. However, the agents have only lo...
H. Van Dyke Parunak, Sven Brueckner, John A. Saute...