Sciweavers

526 search results - page 90 / 106
» Towards the Verifying Compiler
Sort
View
CI
2005
86views more  CI 2005»
13 years 9 months ago
Strategic Interactions in a Supply Chain Game
The TAC 2003 supply-chain game presented automated trading agents with a challenging strategic problem. Embedded within a high-dimensional stochastic environment was a pivotal str...
Michael P. Wellman, Joshua Estelle, Satinder P. Si...
COMPSEC
2004
95views more  COMPSEC 2004»
13 years 9 months ago
Cumulative notarization for long-term preservation of digital signatures
The long-term preservation of digitally signed documents may be approached and analyzed from various perspectives, i.e. future data readability, signature validity, storage media ...
Dimitrios Lekkas, Dimitris Gritzalis
TELSYS
2002
70views more  TELSYS 2002»
13 years 9 months ago
Integrating Differentiated Services with ATM
IP in the edge and ATM in the core are commonplace in today's internetworks. The IETF has proposed a new Quality of Service (QoS) mechanism namely Differentiated Services (Dif...
Sowmya Manjanatha, Radim Bartos
UIST
2010
ACM
13 years 7 months ago
The IR ring: authenticating users' touches on a multi-touch display
Multi-touch displays are particularly attractive for collaborative work because multiple users can interact with applications simultaneously. However, unfettered access can lead t...
Volker Roth, Philipp Schmidt, Benjamin Gülden...
ICSE
2009
IEEE-ACM
13 years 7 months ago
Software Assumptions Failure Tolerance: Role, Strategies, and Visions
Abstract. At our behest or otherwise, while our software is being executed, a huge variety of design assumptions is continuously matched with the truth of the current condition. Wh...
Vincenzo De Florio