Sciweavers

1163 search results - page 52 / 233
» Department of Redundancy Department
Sort
View
CCS
2008
ACM
13 years 9 months ago
Black-box accountable authority identity-based encryption
A well-known concern in the setting of identity based encryption is that the PKG is all powerful and has to be completely trusted. To mitigate this problem, the notion of Accounta...
Vipul Goyal, Steve Lu, Amit Sahai, Brent Waters
DLT
2007
13 years 9 months ago
Two Element Unavoidable Sets of Partial Words
d Abstract) F. Blanchet-Sadri1 , N.C. Brownstein2 , and Justin Palumbo3 1 Department of Computer Science, University of North Carolina, P.O. Box 26170, Greensboro, NC 27402–6170,...
Francine Blanchet-Sadri, N. C. Brownstein, Justin ...
AAAI
1998
13 years 9 months ago
Handling Inconsistency for Multi-Source Integration
The overwhelming amount of information sources now available through the internet has increased the need to combine or integrate the data retrieved from these sources in an intell...
Sheila Tejada, Craig A. Knoblock, Steven Minton
LISA
1998
13 years 9 months ago
SEPP: Software Installation and Sharing System
SEPP is an application installation, sharing and packaging solution for large, decentrally managed Unix environments. SEPP can be used without making modifications to the organiza...
Tobias Oetiker
SODA
2000
ACM
95views Algorithms» more  SODA 2000»
13 years 9 months ago
Towards a theory of cache-efficient algorithms
We present a model that enables us to analyze the running time of an algorithm on a computer with a memory hierarchy with limited associativity, in terms of various cache parameter...
Sandeep Sen, Siddhartha Chatterjee