Sciweavers

478 search results - page 43 / 96
» A new approach to auctions and resilient mechanism design
Sort
View
CODES
2010
IEEE
13 years 5 months ago
Hardware/software optimization of error detection implementation for real-time embedded systems
This paper presents an approach to system-level optimization of error detection implementation in the context of fault-tolerant realtime distributed embedded systems used for safe...
Adrian Lifa, Petru Eles, Zebo Peng, Viacheslav Izo...
CHI
1997
ACM
14 years 1 months ago
Revisitation Patterns in World Wide Web Navigation
In this paper, we report on users' revisitation patterns to World Wide Web (WWW) pages, and use the results to lay an empirical foundation for the design of history mechanism...
Linda Tauscher, Saul Greenberg
SP
2010
IEEE
210views Security Privacy» more  SP 2010»
14 years 26 days ago
Reconciling Belief and Vulnerability in Information Flow
Abstract—Belief and vulnerability have been proposed recently to quantify information flow in security systems. Both concepts stand as alternatives to the traditional approaches...
Sardaouna Hamadou, Vladimiro Sassone, Catuscia Pal...
ICWE
2005
Springer
14 years 2 months ago
Discovering Re-usable Design Solutions in Web Conceptual Schemas: Metrics and Methodology
Abstract. In the Internet era, the development of Web applications has impressively evolved and is characterized by a large degree of complexity. To this end, software community ha...
Yannis Panagis, Evangelos Sakkopoulos, Spiros Sirm...
SOFTCO
2004
Springer
14 years 2 months ago
Designing Neural Networks Using Gene Expression Programming
Abstract. An artificial neural network with all its elements is a rather complex structure, not easily constructed and/or trained to perform a particular task. Consequently, severa...
Cândida Ferreira