Sciweavers

472 search results - page 31 / 95
» What Networking of Information Can Do for Cloud Computing
Sort
View
IPPS
2006
IEEE
14 years 1 months ago
A case for exploit-robust and attack-aware protocol RFCs
A large number of vulnerabilities occur because protocol implementations failed to anticipate illegal packets. rfcs typically define what constitute “right” packets relevant ...
Venkat Pothamsetty, Prabhaker Mateti
IJCAI
1993
13 years 9 months ago
Action Representation and Purpose: Re-evaluating the Foundations of Computational Vision
The traditional goal of computer vision, to reconstruct, or recover properties of, the scene has recently been challenged by advocates of a new purposive approach in which the vis...
Michael J. Black, Yiannis Aloimonos, Christopher M...
WH
2010
142views Healthcare» more  WH 2010»
13 years 2 months ago
Social sensing: obesity, unhealthy eating and exercise in face-to-face networks
What is the role of face-to-face interactions in the diffusion of health-related behaviors- diet choices, exercise habits, and long-term weight changes? We use co-location and com...
Anmol Madan, Sai T. Moturu, David Lazer, Alex Pent...
ECAI
2010
Springer
13 years 7 months ago
Optimal Task Migration in Service-Oriented Systems: Algorithms and Mechanisms
In service-oriented systems, such as grids and clouds, users are able to outsource complex computational tasks by procuring resources on demand from remote service providers. As th...
Sebastian Stein, Enrico Gerding, Nicholas R. Jenni...
KR
1998
Springer
13 years 12 months ago
Combining Narratives
A theory is elaboration tolerant to the extent that new information can be incorporated with only simple changes. The simplest change is conjoining new information, and only conju...
John McCarthy, Tom Costello