Sciweavers

1352 search results - page 131 / 271
» Designing Security Requirements Models Through Planning
Sort
View
CMG
2001
13 years 11 months ago
Jump Start Your Performance Career Using Analytic Modeling
What is the career path for a performance analyst? A capacity planner? Most technicians paid their dues in the trenches of systems programming or operations. Having done it all, t...
Denise P. Kalm
MSWIM
2009
ACM
14 years 5 months ago
Designing an asynchronous group communication middleware for wireless users
We evaluate an asynchronous gossiping middleware for wireless users that propagates messages from any group member to all the other group members. This propagation can either be i...
Xuwen Yu, Surendar Chandra
JOT
2008
124views more  JOT 2008»
13 years 10 months ago
Methodological Proposal for Business Process Management sustained in the use of Patterns
At the moment, enterprises require complex business models with an organizational structures, processes and systems that must be explicitly designed. The work designed by these bu...
Pedro Bonillo, Nancy Zambrano, Alecia Eleonora Aco...
ICRA
2006
IEEE
165views Robotics» more  ICRA 2006»
14 years 4 months ago
Trajectory Tracking and Balance Stabilization Control of Autonomous Motorcycles
— In this paper, we present a trajectory tracking control algorithm for an autonomous motorcycle for the DARPA Grand Challenge. The mathematical dynamic model of the autonomous m...
Jingang Yi, Dezhen Song, Anthony Levandowski, Suha...
IACR
2011
115views more  IACR 2011»
12 years 9 months ago
Multi-Server Oblivious RAM
Secure two-party computation protocol allows two players, Alice with secret input x and Bob with secret input y, to jointly execute an arbitrary program π(x, y) such that only th...
Steve Lu, Rafail Ostrovsky