Sciweavers

2421 search results - page 431 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
ICDCS
2008
IEEE
14 years 4 months ago
stdchk: A Checkpoint Storage System for Desktop Grid Computing
— Checkpointing is an indispensable technique to provide fault tolerance for long-running high-throughput applications like those running on desktop grids. This paper argues that...
Samer Al-Kiswany, Matei Ripeanu, Sudharshan S. Vaz...
ICRA
2008
IEEE
163views Robotics» more  ICRA 2008»
14 years 4 months ago
Dealing with laser scanner failure: Mirrors and windows
— This paper addresses the problem of laser scanner failure on mirrors and windows. Mirrors and glasses are quite common objects that appear in our daily lives. However, while la...
Shao-Wen Yang, Chieh-Chih Wang
DATE
2007
IEEE
80views Hardware» more  DATE 2007»
14 years 4 months ago
Engineering trust with semantic guardians
The ability to guarantee the functional correctness of digital integrated circuits and, in particular, complex microprocessors, is a key task in the production of secure and trust...
Ilya Wagner, Valeria Bertacco
CIA
2007
Springer
14 years 4 months ago
Trust Modeling with Context Representation and Generalized Identities
Abstract. We present a trust model extension that attempts to relax the assumptions that are currently taken by the majority of existing trust models: (i) proven identity of agents...
Martin Rehák, Michal Pechoucek
SUM
2007
Springer
14 years 4 months ago
Incomplete Statistical Information Fusion and Its Application to Clinical Trials Data
In medical clinical trials, overall trial results are highlighted in the s of papers/reports. These results are summaries of underlying statistical analysis where most of the time ...
Jianbing Ma, Weiru Liu, Anthony Hunter