Sciweavers

621 search results - page 16 / 125
» Identifying the (Tele)Presence Literature
Sort
View
INFOCOM
2011
IEEE
12 years 11 months ago
Capacity of byzantine agreement with finite link capacity
—We consider the problem of maximizing the throughput of Byzantine agreement, when communication links have finite capacity. Byzantine agreement is a classical problem in distri...
Guanfeng Liang, Nitin H. Vaidya
EDBT
2012
ACM
262views Database» more  EDBT 2012»
11 years 10 months ago
The application of differential privacy to health data
Differential privacy has gained a lot of attention in recent years as a general model for the protection of personal information when used and disclosed for secondary purposes. It...
Fida Kamal Dankar, Khaled El Emam
IEEEARES
2006
IEEE
14 years 1 months ago
Feasibility of Multi-Protocol Attacks
Formal modeling and verification of security protocols typically assumes that a protocol is executed in isolation, without other protocols sharing the network. We investigate the...
Cas J. F. Cremers
ESEM
2007
ACM
13 years 11 months ago
Evidence relating to Object-Oriented software design: A survey
Context: There is little empirical knowledge of the effectiveness of the object-oriented paradigm. Objectives: To conduct a systematic review of the literature describing empirica...
John Bailey, David Budgen, Mark Turner, Barbara Ki...
COMSUR
2000
202views more  COMSUR 2000»
13 years 7 months ago
A Survey of Trust in Internet Applications
Trust is an important aspect of decision making for Internet applications and particularly influences the specification of security policy i.e. who is authorised to perform action...
Tyrone Grandison, Morris Sloman