Sciweavers

105 search results - page 14 / 21
» Algorithmic Proof with Diminishing Resources, Part 1
Sort
View
WSC
2008
13 years 10 months ago
Automating the constraining process
The typical approach to finding minimum levels of resources that still allow support and operational performance goals to be met for military aircraft is based on a manual trial-a...
Joel J. Luna
CCS
2008
ACM
13 years 9 months ago
Authenticated hash tables
Hash tables are fundamental data structures that optimally answer membership queries. Suppose a client stores n elements in a hash table that is outsourced at a remote server so t...
Charalampos Papamanthou, Roberto Tamassia, Nikos T...
CP
2003
Springer
14 years 1 months ago
Open Constraint Optimization
Constraint satisfaction has been applied with great success in closed-world scenarios, where all options and constraints are known from the beginning and fixed. With the internet,...
Boi Faltings, Santiago Macho-Gonzalez
AWPN
2008
311views Algorithms» more  AWPN 2008»
13 years 9 months ago
WoPeD 2.0 goes BPEL 2.0
WoPeD (Workflow Petrinet Designer) is an easy-to-use, Java-based open source software tool being developed at the University of Cooperative Education, Karlsruhe. WoPeD is able to e...
Andreas Eckleder, Thomas Freytag
PADS
2003
ACM
14 years 1 months ago
Reducing the Size of Routing Tables for Large-scale Network Simulation
In simulating large-scale networks, due to the limitation of available resources on computers, the size of the networks and the scale of simulation scenarios are often restricted....
Akihito Hiromori, Hirozumi Yamaguchi, Keiichi Yasu...