Sciweavers

489 search results - page 84 / 98
» Reasoning about confidentiality at requirements engineering ...
Sort
View
SMA
2003
ACM
123views Solid Modeling» more  SMA 2003»
14 years 3 months ago
Collision prediction for polyhedra under screw motions
The prediction of collisions amongst N rigid objects may be reduced to a series of computations of the time to first contact for all pairs of objects. Simple enclosing bounds and...
ByungMoon Kim, Jarek Rossignac
INFOCOM
2010
IEEE
13 years 8 months ago
MeasuRouting: A Framework for Routing Assisted Traffic Monitoring
Monitoring transit traffic at one or more points in a network is of interest to network operators for reasons of traffic accounting, debugging or troubleshooting, forensics, and tr...
Saqib Raza, Guanyao Huang, Chen-Nee Chuah, Srini S...
WWW
2008
ACM
14 years 11 months ago
Anycast CDNS revisited
Because it is an integral part of the Internet routing apparatus, and because it allows multiple instances of the same service to be "naturally" discovered, IP Anycast h...
Hussein A. Alzoubi, Seungjoon Lee, Michael Rabinov...
CP
2005
Springer
14 years 3 months ago
2-Way vs. d-Way Branching for CSP
Abstract. Most CSP algorithms are based on refinements and extensions of backtracking, and employ one of two simple “branching schemes”: 2-way branching or d-way branching, fo...
Joey Hwang, David G. Mitchell
AAAI
1998
13 years 11 months ago
Learning Investment Functions for Controlling the Utility of Control Knowledge
The utility problem occurs when the cost of the acquired knowledge outweighs its bene ts. When the learner acquires control knowledge for speeding up a problem solver, the bene t ...
Oleg Ledeniov, Shaul Markovitch