Sciweavers

957 search results - page 88 / 192
» Addition Chain Heuristics
Sort
View
CRYPTO
2000
Springer
184views Cryptology» more  CRYPTO 2000»
14 years 2 months ago
A Practical and Provably Secure Coalition-Resistant Group Signature Scheme
A group signature scheme allows a group member to sign messages anonymously on behalf of the group. However, in the case of a dispute, the identity of a signature’s originator ca...
Giuseppe Ateniese, Jan Camenisch, Marc Joye, Gene ...
IPPS
1999
IEEE
14 years 2 months ago
A Robust Adaptive Metric for Deadline Assignment in Heterogeneous Distributed Real-Time Systems
In a real-time system, tasks are constrained by global endto-end (E-T-E) deadlines. In order to cater for high task schedulability, these deadlines must be distributed over compon...
Jan Jonsson
GECCO
1999
Springer
14 years 2 months ago
Infrastructure Work Order Planning Using Genetic Algorithms
Infrastructure management offices plan and complete several thousand small construction projects annually. Effective planning is vital if the public and private sectors are to mai...
E. William East
EDBT
1998
ACM
130views Database» more  EDBT 1998»
14 years 2 months ago
Fusion Queries over Internet Databases
Abstract. Fusion queries search for information integrated from distributed, autonomous sources over the Internet. We investigate techniques for e cient processing of fusion querie...
Ramana Yerneni, Yannis Papakonstantinou, Serge Abi...
IPPS
1997
IEEE
14 years 2 months ago
A Parallel Tabu Search Algorithm For The 0-1 Multidimensional Knapsack Problem
The 0 1 MultidimensionalKnapsack Problem (0 1 MKP) is a NP-complete problem. Its resolution for large scale instances requires a prohibitive processing time. In this paper we prop...
Smaïl Niar, Arnaud Fréville