Sciweavers

3914 search results - page 779 / 783
» Automating SLA modeling
Sort
View
154
Voted
GAMESEC
2010
244views Game Theory» more  GAMESEC 2010»
15 years 17 days ago
The Password Game: Negative Externalities from Weak Password Practices
The combination of username and password is widely used as a human authentication mechanism on the Web. Despite this universal adoption and despite their long tradition, password s...
Sören Preibusch, Joseph Bonneau
SIGSOFT
2010
ACM
15 years 13 days ago
Finding latent performance bugs in systems implementations
Robust distributed systems commonly employ high-level recovery mechanisms enabling the system to recover from a wide variety of problematic environmental conditions such as node f...
Charles Edwin Killian, Karthik Nagaraj, Salman Per...
186
Voted
ICMI
2009
Springer
196views Biometrics» more  ICMI 2009»
15 years 9 days ago
Communicative gestures in coreference identification in multiparty meetings
During multiparty meetings, participants can use non-verbal modalities such as hand gestures to make reference to the shared environment. Therefore, one hypothesis is that incorpo...
Tyler Baldwin, Joyce Y. Chai, Katrin Kirchhoff
BMCBI
2011
14 years 9 months ago
Bio: : Phylo - phyloinformatic analysis using Perl
Background: Phyloinformatic analyses involve large amounts of data and metadata of complex structure. Collecting, processing, analyzing, visualizing and summarizing these data and...
Rutger A. Vos, Jason Caravas, Klaas Hartmann, Mark...
118
Voted
SCP
2011
210views Communications» more  SCP 2011»
14 years 9 months ago
Internal axioms for domain semirings
a more abstract characterisation in the setting of semirings. Formally, a domain semiring is a semiring S extended by a domain operation d : S → S which, for all x, y ∈ S, sati...
Jules Desharnais, Georg Struth