Sciweavers

1557 search results - page 41 / 312
» What can we do with a Solution
Sort
View
FGCS
2006
101views more  FGCS 2006»
13 years 7 months ago
Evaluating architectures for independently auditing service level agreements
Web and grid services are quickly maturing as a technology that allows for the integration of applications belonging to different administrative domains, enabling much faster and ...
Ana Carolina Barbosa, Jacques Philippe Sauvé...
ICWSM
2008
13 years 9 months ago
Blog Link Classification
Blog links raise three key questions: Why did the author make the link, what exactly is he pointing at, and what does he feel about it? In response to these questions we introduce...
Justin Martineau, Matthew Hurst
TARK
2007
Springer
14 years 1 months ago
Knowledge-based modelling of voting protocols
We contend that reasoning about knowledge is both natural and pragmatic for verification of electronic voting protocols. We present a model in which desirable properties of elect...
A. Baskar, Ramaswamy Ramanujam, S. P. Suresh
ICDCIT
2005
Springer
14 years 1 months ago
Cleaning an Arbitrary Regular Network with Mobile Agents
In this paper, we consider a contaminated network with an intruder. The task for the mobile agents is to decontaminate all hosts while preventing a recontamination and to do so as ...
Paola Flocchini, Amiya Nayak, Arno Schulz
EOR
2006
59views more  EOR 2006»
13 years 7 months ago
Sensitivity analysis in linear optimization: Invariant support set intervals
Sensitivity analysis is one of the most interesting and preoccupying areas in optimization. Many attempts are made to investigate the problem's behavior when the input data c...
Alireza Ghaffari Hadigheh, Tamás Terlaky