Sciweavers

1711 search results - page 65 / 343
» Completing pseudojump operators
Sort
View
NCA
2005
IEEE
14 years 1 months ago
Networking Aspects in the DPASA Survivability Architecture: An Experience Report
The same network infrastructure that is essential for the operation of today’s high valued distributed systems can also be misused by malicious attackers. Experience shows that ...
Michael Atighetchi, Paul Rubel, Partha Pratim Pal,...
WETICE
2005
IEEE
14 years 1 months ago
Transparent Remote File Access in the Minimum Intrusion Grid
This paper describes the implementation of a thin user-level layer to be installed on Grid resources. The layer fits in the Minimum intrusion Grid design by imposing as few requi...
Rasmus Andersen, Brian Vinter
ASM
2005
ASM
14 years 1 months ago
AsmL Semantics in Fixpoint
AsmL is a novel executable specification language based on the theory of State Machines (ASMs). It represents one of the most powerful practical engines to write and execute ASMs...
Ali Habibi, Sofiène Tahar
ICIAP
2005
ACM
14 years 1 months ago
Real-Time Avatar Animation Steered by Live Body Motion
The future customer service provided by call centres will be changed due to new web-based interactive multimedia technologies. Technical support will be offered in a completely new...
Oliver Schreer, Ralf Tanger, Peter Eisert, Peter K...
LPNMR
2004
Springer
14 years 1 months ago
Set Constraints in Logic Programming
We investigate a generalization of weight-constraint programs with stable semantics, as implemented in the ASP solver smodels. Our programs admit atoms of the form X, F where X is ...
V. Wiktor Marek, Jeffrey B. Remmel