Sciweavers

3482 search results - page 632 / 697
» In Praise of Numerical Computation
Sort
View
ISCAS
2006
IEEE
112views Hardware» more  ISCAS 2006»
14 years 3 months ago
Silicon neurons that inhibit to synchronize
Abstract—We present a silicon neuron that uses shunting inhibition (conductance-based) with a synaptic rise-time to achieve synchrony. Synaptic rise-time promotes synchrony by de...
John V. Arthur, Kwabena Boahen
NDSS
2006
IEEE
14 years 3 months ago
Trust Negotiation with Hidden Credentials, Hidden Policies, and Policy Cycles
In an open environment such as the Internet, the decision to collaborate with a stranger (e.g., by granting access to a resource) is often based on the characteristics (rather tha...
Keith B. Frikken, Jiangtao Li, Mikhail J. Atallah
SIGCOMM
2006
ACM
14 years 2 months ago
Quantifying Skype user satisfaction
The success of Skype has inspired a generation of peer-topeer-based solutions for satisfactory real-time multimedia services over the Internet. However, fundamental questions, suc...
Kuan-Ta Chen, Chun-Ying Huang, Polly Huang, Chin-L...
IPPS
2005
IEEE
14 years 2 months ago
Security-Driven Heuristics and A Fast Genetic Algorithm for Trusted Grid Job Scheduling
In this paper, our contributions are two-fold: First, we enhance the Min-Min and Sufferage heuristics under three risk modes driven by security concerns. Second, we propose a new ...
Shanshan Song, Yu-Kwong Kwok, Kai Hwang
SIGUCCS
2005
ACM
14 years 2 months ago
A case study: implementing novell identity management at Drew University
Starting in 2003, Drew University began a process to replace its manual account management procedures with an automated provisioning system based upon Novell technologies. Over th...
E. Axel Larsson