Sciweavers

563 search results - page 62 / 113
» A Typing Scheme for Behavioural Models
Sort
View
TPDS
2008
106views more  TPDS 2008»
13 years 8 months ago
Security-Aware Resource Allocation for Real-Time Parallel Jobs on Homogeneous and Heterogeneous Clusters
Security is increasingly becoming an important issue in the design of real-time parallel applications, which are widely used in the industry and academic organizations. However, ex...
Tao Xie 0004, Xiao Qin
CN
2004
102views more  CN 2004»
13 years 8 months ago
Comparing economic incentives in peer-to-peer networks
Users who join a peer-to-peer network have, in general, suboptimal incentives to contribute to the network, because of the externalities that exist between them. The result is an ...
Panayotis Antoniadis, Costas Courcoubetis, Robin M...
CGF
2006
72views more  CGF 2006»
13 years 8 months ago
GEncode: Geometry-driven compression for General Meshes
Performances of actual mesh compression algorithms vary significantly depending on the type of model it encodes. These methods rely on prior assumptions on the mesh to be efficient...
Thomas Lewiner, Marcos Craizer, Hélio Lopes...
ACL
2012
11 years 11 months ago
Decoding Running Key Ciphers
There has been recent interest in the problem of decoding letter substitution ciphers using techniques inspired by natural language processing. We consider a different type of cla...
Sravana Reddy, Kevin Knight
DALT
2004
Springer
14 years 2 months ago
A Protocol for Resource Sharing in Norm-Governed Ad Hoc Networks
Ad hoc networks may be viewed as computational systems whose members may fail to, or choose not to, comply with the rules governing their behaviour. We are investigating to what ex...
Alexander Artikis, Lloyd Kamara, Jeremy Pitt, Mare...