Sciweavers

1222 search results - page 209 / 245
» corr 2008
Sort
View
CORR
2008
Springer
66views Education» more  CORR 2008»
14 years 10 months ago
A Novel Approach to Formulae Production and Overconfidence Measurement to Reduce Risk in Spreadsheet Modelling
Research on formulae production in spreadsheets has established the practice as high risk yet unrecognised as such by industry. There are numerous software applications that are d...
Simon R. Thorne, David Ball, Zoe Lawson
79
Voted
CORR
2008
Springer
112views Education» more  CORR 2008»
14 years 10 months ago
Improved Squeaky Wheel Optimisation for Driver Scheduling
Abstract. This paper presents a technique called Improved Squeaky Wheel Optimisation (ISWO) for driver scheduling problems. It improves the original Squeaky Wheel Optimisation'...
Uwe Aickelin, Edmund K. Burke, Jingpeng Li
80
Voted
CORR
2008
Springer
102views Education» more  CORR 2008»
14 years 10 months ago
SAFIUS - A secure and accountable filesystem over untrusted storage
We describe SAFIUS, a secure accountable file system that resides over an untrusted storage. SAFIUS provides strong security guarantees like confidentiality, integrity, prevention ...
V. Sriram, Ganesh M. Narayan, K. Gopinath
CORR
2008
Springer
187views Education» more  CORR 2008»
14 years 10 months ago
Securing U-Healthcare Sensor Networks using Public Key Based Scheme
Recent emergence of electronic culture uplifts healthcare facilities to a new era with the aid of wireless sensor network (WSN) technology. Due to the sensitiveness of medical data...
Md. Mokammel Haque, Al-Sakib Khan Pathan, Choong S...
CORR
2008
Springer
98views Education» more  CORR 2008»
14 years 10 months ago
Information Acquisition and Exploitation in Multichannel Wireless Networks
A wireless system with multiple channels is considered, where each channel has several transmission states. A user learns about the instantaneous state of an available channel by ...
Sudipto Guha, Kamesh Munagala, Saswati Sarkar