Sciweavers

887 search results - page 30 / 178
» A Time for Choosing
Sort
View
ACSAC
2004
IEEE
13 years 11 months ago
Designing Good Deceptions in Defense of Information Systems
Since attackers trust computer systems to tell them the truth, it may be effective for those systems to lie or mislead. This could waste the attacker's resources while permit...
Neil C. Rowe
ICDCS
1995
IEEE
13 years 11 months ago
A Competitive Analysis for Retransmission Timeout
Protocols that provide reliable communicationon top of a network that can lose packets rely on periodically retransmitting packets. The choice of retransmission timeout critically...
Shlomi Dolev, Michael Kate, Jennifer L. Welch
CG
2004
Springer
13 years 7 months ago
Time-critical rendering for time-varying volume data
In this paper, we present a novel method to meet the time-critical requirement in rendering time-varying volume data. In time-critical rendering, the rendering is demanded to be c...
Shih-Kuan Liao, Jim Z. C. Lai, Yeh-Ching Chung
IPPS
2005
IEEE
14 years 1 months ago
Improving and Stabilizing Parallel Computer Performance Using Adaptive Backfilling
The scheduler is a key component in determining the overall performance of a parallel computer, and as we show here, the schedulers in wide use today exhibit large unexplained gap...
David Talby, Dror G. Feitelson
JELIA
1994
Springer
13 years 11 months ago
Temporal Theories of Reasoning
: In this paper we describe a general way of formalizing reasoning behaviour. Such a behaviour may be described by all the patterns which are valid for the behaviour. A pattern can...
Joeri Engelfriet, Jan Treur