Sciweavers

5790 search results - page 1036 / 1158
» Distributed programming with distributed authorization
Sort
View
INFOVIS
2003
IEEE
14 years 2 months ago
A Visual Workspace for Hybrid Multidimensional Scaling Algorithms
In visualising multidimensional data, it is well known that different types of data require different types of algorithms to process them. Data sets might be distinguished accordi...
Greg Ross, Matthew Chalmers
LICS
2003
IEEE
14 years 2 months ago
Model checking for probability and time: from theory to practice
Probability features increasingly often in software and hardware systems: it is used in distributed co-ordination and routing problems, to model fault-tolerance and performance, a...
Marta Z. Kwiatkowska
NDSS
2003
IEEE
14 years 2 months ago
Access Control Based on Execution History
Security is a major, frequent concern in extensible software systems such as Java Virtual Machines and the Common Language Runtime. These systems aim to enable simple, classic app...
Martín Abadi, Cédric Fournet
SRDS
2003
IEEE
14 years 2 months ago
Performance and Effectiveness Analysis of Checkpointing in Mobile Environments
Many mathematical models have been proposed to evaluate the execution performance of an application with and without checkpointing in the presence of failures. They assume that th...
Xinyu Chen, Michael R. Lyu
SIGCSE
2003
ACM
198views Education» more  SIGCSE 2003»
14 years 2 months ago
Computer graphics in undergraduate computational science education
Computer graphics forms an important part of a working scientist’s tools. This may be provided by resources with the scientist’s group or by capabilities of the toolkits that ...
Steve Cunningham, Angela B. Shiflet
« Prev « First page 1036 / 1158 Last » Next »