Sciweavers

1959 search results - page 283 / 392
» Concerned About Separation
Sort
View
SAC
2008
ACM
15 years 3 months ago
Privacy-preserving link discovery
Abstract. Link discovery is a process of identifying association(s) among different entities included in a complex network structure. These association(s) may represent any interac...
Xiaoyun He, Basit Shafiq, Jaideep Vaidya, Nabil R....
JAPLL
2010
104views more  JAPLL 2010»
15 years 2 months ago
Complete axiomatizations for XPath fragments
We provide complete axiomatizations for several fragments of XPath: sets of equivalences from which every other valid equivalence is derivable. Specifically, we axiomatize downwar...
Balder ten Cate, Tadeusz Litak, Maarten Marx
MANSCI
2010
106views more  MANSCI 2010»
15 years 2 months ago
Improving Supply Chain Performance and Managing Risk Under Weather-Related Demand Uncertainty
This paper considers a manufacturer-retailer supply chain for a seasonal product whose demand is weather-sensitive. The retailer orders from the manufacturer (supplier) prior to t...
Frank Youhua Chen, Candace Arai Yano
MICRO
2010
IEEE
153views Hardware» more  MICRO 2010»
15 years 2 months ago
AVF Stressmark: Towards an Automated Methodology for Bounding the Worst-Case Vulnerability to Soft Errors
Soft error reliability is increasingly becoming a first-order design concern for microprocessors, as a result of higher transistor counts, shrinking device geometries and lowering ...
Arun A. Nair, Lizy Kurian John, Lieven Eeckhout
WIOPT
2010
IEEE
15 years 2 months ago
Energy efficient scheduling with power control for wireless networks
Scheduling of transmissions is one of the most fundamental problems in the context of wireless networks. In this article, we consider the problem of computing power efficient sched...
Bastian Katz, Markus Völker, Dorothea Wagner