Sciweavers

9245 search results - page 1566 / 1849
» Virtualization
Sort
View
EPEW
2008
Springer
15 years 6 months ago
Evaluation of P2P Algorithms for Probabilistic Trust Inference in a Web of Trust
The problem of finding trust paths and estimating the trust one can place in a partner arises in various application areas, including virtual organisations, authentication systems ...
Huqiu Zhang, Aad P. A. van Moorsel
ER
2008
Springer
179views Database» more  ER 2008»
15 years 6 months ago
Recommendation Based Process Modeling Support: Method and User Experience
Abstract Although most workflow management systems nowadays offer graphical editors for process modeling, the learning curve is still too steep for users who are unexperienced in p...
Thomas Hornung, Agnes Koschmider, Georg Lausen
ESA
2008
Springer
115views Algorithms» more  ESA 2008»
15 years 6 months ago
Deterministic Sampling Algorithms for Network Design
For several NP-hard network design problems, the best known approximation algorithms are remarkably simple randomized algorithms called Sample-Augment algorithms in [11]. The algor...
Anke van Zuylen
ESORICS
2008
Springer
15 years 6 months ago
Sharemind: A Framework for Fast Privacy-Preserving Computations
Gathering and processing sensitive data is a difficult task. In fact, there is no common recipe for building the necessary information systems. In this paper, we present a provably...
Dan Bogdanov, Sven Laur, Jan Willemson
IE
2007
15 years 5 months ago
Dramatic flow in interactive 3D narrative
The concept of dramatic level is crucial for a model of dramatic flow. We present a framework to maintain optimal dramatic flow in an interactive 3D environment where both linea...
Alyx Macfadyen, Andrew Stranieri, John Yearwood
« Prev « First page 1566 / 1849 Last » Next »