Sciweavers

696 search results - page 78 / 140
» Planning for Network-Aware Paths
Sort
View
156
Voted
HICSS
2011
IEEE
210views Biometrics» more  HICSS 2011»
14 years 7 months ago
Different Paths to Broadband Access: The Impact of Governance and Policy on Broadband Diffusion in the Developed and Developing
A new digital divide is emerging both within and between nations that is due to inequalities in broadband Internet access. Our research examines the broadband digital divide by an...
David J. Yates, Girish J. Gulati, Joseph W. Weiss
109
Voted
CORR
2010
Springer
146views Education» more  CORR 2010»
15 years 4 months ago
Building Computer Network Attacks
In this work we start walking the path to a new perspective for viewing cyberwarfare scenarios, by introducing conceptual tools (a formal model) to evaluate the costs of an attack...
Ariel Futoransky, Luciano Notarfrancesco, Gerardo ...
PODC
2012
ACM
13 years 6 months ago
Byzantine broadcast in point-to-point networks using local linear coding
The goal of Byzantine Broadcast (BB) is to allow a set of fault-free nodes to agree on information that a source node wants to broadcast to them, in the presence of Byzantine faul...
Guanfeng Liang, Nitin H. Vaidya
ICSOC
2005
Springer
15 years 9 months ago
Trust-Based Secure Workflow Path Construction
—Service-oriented computing promotes collaboration by defining the standards layer that allows compatibility between disparate domains. Workflows, by taking advantage of the serv...
Mine Altunay, Douglas E. Brown, Gregory T. Byrd, R...
COMPGEOM
2004
ACM
15 years 7 months ago
Continuous path verification in multi-axis NC-machining
We introduce a new approach to the problem of collision detection between a rotating milling-cutter of an NC-machine and a model of a solid workpiece, as the rotating cutter conti...
Ron Wein, Oleg Ilushin, Gershon Elber, Dan Halperi...