Sciweavers

1663 search results - page 193 / 333
» Computer Security in the Real World
Sort
View
ECAI
2010
Springer
15 years 5 months ago
An Empirical Study of the Manipulability of Single Transferable Voting
Abstract. Voting is a simple mechanism to combine together the preferences of multiple agents. Agents may try to manipulate the result of voting by mis-reporting their preferences....
Toby Walsh
PE
2007
Springer
137views Optimization» more  PE 2007»
15 years 3 months ago
A prediction method for job runtimes on shared processors: Survey, statistical analysis and new avenues
Grid computing is an emerging technology by which huge numbers of processors over the world create a global source of processing power. Their collaboration makes it possible to pe...
Menno Dobber, Robert D. van der Mei, Ger Koole
IAJIT
2010
150views more  IAJIT 2010»
15 years 2 months ago
Optimal DSP Based Integer Motion Estimation Implementation for H.264/AVC Baseline Encoder
: The coding gain of the H.264/AVC video encoder mainly comes from the new incorporated prediction tools. However, their enormous computation and ultrahigh memory bandwidth are the...
Imen Werda, Haithem Chaouch, Amine Samet, Mohamed ...
171
Voted
CORR
2010
Springer
123views Education» more  CORR 2010»
15 years 1 months ago
Information Delivery System through Bluetooth in Ubiquitous Networks
------------------------------------------------------ABSTRACT-------------------------------------------------------Ubiquitous and pervasive computing (UPC) is a popular paradigm ...
D. Asha Devi, M. Suresh Bab, V. L. Pavani, N. Geet...
DRMTICS
2005
Springer
15 years 9 months ago
The Australian Sony PlayStation Case: How Far Will Anti-circumvention Law Reach in the Name of DRM?
This chapter overviews the legal issues arising from the modification of the Sony PlayStation console under Australian Copyright Law - the so called anti-circumvention provisions....
Brian Fitzgerald