Sciweavers

473 search results - page 76 / 95
» The Case for Quantum Key Distribution
Sort
View
CDC
2010
IEEE
149views Control Systems» more  CDC 2010»
13 years 2 months ago
Nonuniform coverage and cartograms
In this paper, we investigate nonuniform coverage of a planar region by a network of autonomous, mobile agents. We derive centralized nonuniform coverage control laws from uniform ...
Francois Lekien, Naomi Ehrich Leonard
TR
2011
106views more  TR 2011»
13 years 2 months ago
Exploring Complex Systems Aspects of Blackout Risk and Mitigation
Abstract—Electric power transmission systems are a key infrastructure, and blackouts of these systems have major consequences for the economy and national security. Analyses of b...
David E. Newman, Benjamin A. Carreras, Vickie E. L...
EMISAIJ
2010
13 years 2 months ago
The Proviado Access Control Model for Business Process Monitoring Components
Integrated process support is highly desirable in environments where data related to a particular business process are scattered over distributed, heterogeneous information system...
Manfred Reichert, Sarita Bassil, Ralph Bobrik, Tho...
TPDS
2010
113views more  TPDS 2010»
13 years 2 months ago
Highly Available Intrusion-Tolerant Services with Proactive-Reactive Recovery
In the past, some research has been done on how to use proactive recovery to build intrusion-tolerant replicated systems that are resilient to any number of faults, as long as reco...
Paulo Sousa, Alysson Neves Bessani, Miguel Correia...

Publication
209views
12 years 6 months ago
An Exploratory Study on Open Conversation Spaces in Global Software Engineering
Software engineering is by nature a highly collaborative activity and being able to collaborate effectively is a key factor for project success. However, collaborating effectivel...
Kevin Dullemond, Ben van Gameren, Rini van Solinge...