Sciweavers

2089 search results - page 31 / 418
» Finding Environment Guarantees
Sort
View
ISSA
2004
13 years 10 months ago
On Privacy And The Web
Chor et al [3] show that when accessing a single public database, a user is only guaranteed safety from an administrator inferring the user's real intentions (an inference at...
Wesley Brandi
EMSOFT
2010
Springer
13 years 6 months ago
Resource adaptations with servers for hard real-time systems
Many real-time applications are designed to work in different operating modes each characterized by different functionality and resource demands. With each mode change, resource d...
Nikolay Stoimenov, Lothar Thiele, Luca Santinelli,...
ICRA
2007
IEEE
89views Robotics» more  ICRA 2007»
14 years 3 months ago
Probabilistic Strategies for Pursuit in Cluttered Environments with Multiple Robots
Abstract— In this paper, we describe a method for coordinating multiple robots in a pursuit-evasion domain. We examine the problem of multiple robotic pursuers attempting to loca...
Geoffrey Hollinger, Athanasios Kehagias, Sanjiv Si...
ICPPW
2009
IEEE
14 years 3 months ago
Autonomic SLA Management in Federated Computing Environments
—Federated computing environments offer requestors the ability to dynamically invoke services offered by collaborating providers in the virtual service network. Without an effici...
Pawel Rubach, Michael W. Sobolewski
ICIW
2009
IEEE
14 years 3 months ago
An Architecture for Reliable Mobile Workflow in a Grid Environment
— Mobile peer to peer (P2P) computing is becoming a major revolution in computing owing to advances in computing power, network connectivity and storage capacity of mobile device...
Bill Karakostas, George Fakas