Sciweavers

2702 search results - page 318 / 541
» Message from the Editor
Sort
View
MASCOTS
1993
15 years 5 months ago
Simulation Modeling of Weak-Consistency Protocols
: Weak-consistency replication protocols can be used to build wide-area services that are scalable, fault-tolerant, and useful for mobile computer systems. We have evaluated the ti...
Richard A. Golding, Darrell D. E. Long
IJCAI
1989
15 years 5 months ago
A Sequential View of AND-Parallelism Through Partial AND-Processes
Most implementations of AND-parallelism tackle the shared variable problem by running literals in parallel only if they have no variables in common and thus are independent from e...
Bernd Schend
CONCUR
2010
Springer
15 years 5 months ago
Parameterized Verification of Ad Hoc Networks
We study decision problems for parameterized verification of a formal model of Ad Hoc Networks with selective broadcast and spontaneous movement. The communication topology of a ne...
Giorgio Delzanno, Arnaud Sangnier, Gianluigi Zavat...
ICMCS
2010
IEEE
171views Multimedia» more  ICMCS 2010»
15 years 5 months ago
Transforming a pattern identifier into biometric key generators
According to a popular pattern recognition method, this paper proposes two methods to generate a secret from individual's biometric information, such as fingerprint feature p...
Yongdong Wu, Bo Qiu
ICEBE
2007
IEEE
103views Business» more  ICEBE 2007»
15 years 4 months ago
Value and Goal Driven Design of E-Services
- E-services are used as the cornerstones for modeling interaction points of cooperating IT systems, within and between enterprises. So far, research and development of e-services ...
Martin Henkel, Paul Johannesson, Erik Perjons, Jel...