Sciweavers

2913 search results - page 460 / 583
» How Much to Copy
Sort
View
ANTSW
2010
Springer
13 years 7 months ago
Functional Blueprints: An Approach to Modularity in Grown Systems
Abstract. The engineering of grown systems poses fundamentally different system integration challenges than ordinary engineering of static designs. On the one hand, a grown system ...
Jacob Beal
ASIACRYPT
2010
Springer
13 years 7 months ago
Limitations on Transformations from Composite-Order to Prime-Order Groups: The Case of Round-Optimal Blind Signatures
sion of an extended abstract published in Proceedings of Asiacrypt 2010, Springer-Verlag, 2010. Available from the IACR Cryptology ePrint Archive as Report 2010/474. Beginning wit...
Sarah Meiklejohn, Hovav Shacham, David Mandell Fre...
CNSM
2010
13 years 7 months ago
Joint analysis of network incidents and intradomain routing changes
Abstract--This paper studies how intradomain routing instability relates to events in network trouble tickets for two networks: a VPN provider and the Internet2 backbone network. O...
Amelie Medem Kuatse, Renata Teixeira, Nick Feamste...
IAT
2010
IEEE
13 years 7 months ago
Selecting Operator Queries Using Expected Myopic Gain
When its human operator cannot continuously supervise (much less teleoperate) an agent, the agent should be able to recognize its limitations and ask for help when it risks making...
Robert Cohn, Michael Maxim, Edmund H. Durfee, Sati...
IAT
2010
IEEE
13 years 7 months ago
Multiagent Meta-level Control for a Network of Weather Radars
It is crucial for embedded systems to adapt to the dynamics of open environments. This adaptation process becomes especially challenging in the context of multiagent systems. In t...
Shanjun Cheng, Anita Raja, Victor R. Lesser