Sciweavers

235 search results - page 35 / 47
» A Short Introduction to Operating System
Sort
View
WOSS
2004
ACM
14 years 1 months ago
Combining statistical monitoring and predictable recovery for self-management
Complex distributed Internet services form the basis not only of e-commerce but increasingly of mission-critical networkbased applications. What is new is that the workload and in...
Armando Fox, Emre Kiciman, David A. Patterson
CORR
2006
Springer
120views Education» more  CORR 2006»
13 years 8 months ago
Termination orders for 3-dimensional rewriting
Abstract: This paper studies 3-polygraphs as a framework for rewriting on two-dimensional words. A translation of term rewriting systems into 3-polygraphs with explicit resource ma...
Yves Guiraud
SADFE
2008
IEEE
14 years 2 months ago
Finding the Evidence in Tamper-Evident Logs
Secure logs are powerful tools for building systems that must resist forgery, prove temporal relationships, and stand up to forensic scrutiny. The proofs of order and integrity en...
Daniel Sandler, Kyle Derr, Scott A. Crosby, Dan S....
SIBGRAPI
2007
IEEE
14 years 2 months ago
Data Hiding for Binary Documents Robust to Print-Scan, Photocopy and Geometric Distortions
This paper presents a data hiding technique for printed bicolor documents. It inserts tiny dots, hardly noticeable at normal reading distance, to embed the message. For message ex...
Hae Yong Kim, Joceli Mayer
GECCO
2005
Springer
139views Optimization» more  GECCO 2005»
14 years 1 months ago
A genetic algorithm for unmanned aerial vehicle routing
Genetic Algorithms (GAs) can efficiently produce high quality results for hard combinatorial real world problems such as the Vehicle Routing Problem (VRP). Genetic Vehicle Represe...
Matthew A. Russell, Gary B. Lamont