Sciweavers

7839 search results - page 1496 / 1568
» What's News, What's Not
Sort
View
ENTCS
2007
113views more  ENTCS 2007»
13 years 10 months ago
Modular Checkpointing for Atomicity
Transient faults that arise in large-scale software systems can often be repaired by re-executing the code in which they occur. Ascribing a meaningful semantics for safe re-execut...
Lukasz Ziarek, Philip Schatz, Suresh Jagannathan
JSC
2006
52views more  JSC 2006»
13 years 10 months ago
Markov bases of three-way tables are arbitrarily complicated
We show the following two universality statements on the entry-ranges and Markov bases of spaces of 3-way contingency tables with fixed 2-margins: (1) For any finite set D of nonn...
Jesús A. De Loera, Shmuel Onn
JTAER
2006
100views more  JTAER 2006»
13 years 10 months ago
A Model for Improving e-Security in Australian Universities
As universities seek to adopt increased e-business, e-commerce and e-learning initiates, the overall approach taken for security management within the organisation plays an increa...
Lauren May, Tim Lane
JUCS
2006
89views more  JUCS 2006»
13 years 10 months ago
Process Equivalences as Global Bisimulations
: Bisimulation can be defined in a simple way using coinductive methods, and has rather pleasant properties. Ready similarity was proposed by Meyer et al. as a way to weakening the...
David de Frutos-Escrig, Carlos Gregorio-Rodr&iacut...
JVCA
2006
128views more  JVCA 2006»
13 years 10 months ago
Facial actions as visual cues for personality
What visual cues do human viewers use to assign personality characteristics to animated characters? While most facial animation systems associate facial actions to limited emotion...
Ali Arya, Lisa N. Jefferies, James T. Enns, Steve ...
« Prev « First page 1496 / 1568 Last » Next »