Sciweavers

8243 search results - page 1547 / 1649
» Can We Manage Trust
Sort
View
SYNTHESE
2010
70views more  SYNTHESE 2010»
13 years 7 months ago
What ought probably means, and why you can't detach it
: Some intuitive normative principles raise vexing „detaching problems‟ by their failure to license modus ponens. I examine three such principles (a self-reliance principle and...
Stephen Finlay
IPPS
2010
IEEE
13 years 6 months ago
A distributed diffusive heuristic for clustering a virtual P2P supercomputer
Abstract--For the management of a virtual P2P supercomputer one is interested in subgroups of processors that can communicate with each other efficiently. The task of finding these...
Joachim Gehweiler, Henning Meyerhenke
CORR
2010
Springer
177views Education» more  CORR 2010»
13 years 5 months ago
AntiJam: Efficient Medium Access despite Adaptive and Reactive Jamming
Abstract--Intentional interference constitutes a major threat for communication networks operating over a shared medium where availability is imperative. Jamming attacks are often ...
Andréa W. Richa, Christian Scheideler, Stef...
NAR
2010
173views more  NAR 2010»
13 years 3 months ago
The Protein Naming Utility: a rules database for protein nomenclature
Generation of syntactically correct and unambiguous names for proteins is a challenging, yet vital task for functional annotation processes. Proteins are often named based on homo...
Johannes Goll, Robert Montgomery, Lauren M. Brinka...
JCDL
2011
ACM
260views Education» more  JCDL 2011»
12 years 11 months ago
Extending digital repository architectures to support disk image preservation and access
Disk images (bitstreams extracted from physical media) can play an essential role in the acquisition and management of digital collections by serving as containers that support da...
Kam Woods, Christopher A. Lee, Simson Garfinkel
« Prev « First page 1547 / 1649 Last » Next »