Sciweavers

4074 search results - page 217 / 815
» Defining Computational Aesthetics
Sort
View
138
Voted
ECSA
2010
Springer
15 years 3 months ago
Formal approach to security metrics.: what does "more secure" mean for you?
Security metrics are the tools for providing correct and upto-date information about a state of security. This information is essential for managing security efficiently. Although...
Leanid Krautsevich, Fabio Martinelli, Artsiom Yaut...
145
Voted
CORR
2010
Springer
174views Education» more  CORR 2010»
15 years 3 months ago
Cut Elimination for a Logic with Induction and Co-induction
Proof search has been used to specify a wide range of computation systems. In order to build a framework for reasoning about such specifications, we make use of a sequent calculus...
Alwen Tiu, Alberto Momigliano
108
Voted
CORR
2006
Springer
135views Education» more  CORR 2006»
15 years 3 months ago
An equilibrium model for matching impatient demand and patient supply over time
We present a simple dynamic equilibrium model for an online exchange where both buyers and sellers arrive according to a exogenously defined stochastic process. The structure of t...
Garud Iyengar, Anuj Kumar
140
Voted
GRID
2006
Springer
15 years 3 months ago
Cacheable Decentralized Groups for Grid Resource Access Control
Abstract-- Sharing data among collaborators in widely distributed systems remains a challenge due to limitations with existing methods for defining groups across administrative dom...
Jeffrey Hemmes, Douglas Thain
141
Voted
JMIV
2008
214views more  JMIV 2008»
15 years 3 months ago
A Network Flow Algorithm for Reconstructing Binary Images from Continuous X-rays
Tomography is a powerful technique to obtain accurate images of the interior of an object in a nondestructive way. Conventional reconstruction algorithms, such as filtered backproj...
Kees Joost Batenburg