Sciweavers

2028 search results - page 151 / 406
» Deriving Relation Keys from XML Keys
Sort
View
SIAMDM
2002
124views more  SIAMDM 2002»
15 years 4 months ago
Scheduling Unrelated Machines by Randomized Rounding
We present a new class of randomized approximation algorithms for unrelated parallel machine scheduling problems with the average weighted completion time objective. The key idea i...
Andreas S. Schulz, Martin Skutella
ESOP
2003
Springer
15 years 9 months ago
On the Secure Implementation of Security Protocols
We consider the problem of implementing a security protocol in such a manner that secrecy of sensitive data is not jeopardized. Implementation is assumed to take place in the cont...
Pablo Giambiagi, Mads Dam
AAAI
2000
15 years 6 months ago
A Game-Theoretic Approach to Constraint Satisfaction
We shed light on the connections between different approaches to constraint satisfaction by showing that the main consistency concepts used to derive tractability results for cons...
Phokion G. Kolaitis, Moshe Y. Vardi
EOR
2010
62views more  EOR 2010»
15 years 4 months ago
Residual income and value creation: An investigation into the lost-capital paradigm
This paper presents a new way of measuring residual income, originally introduced by Magni (2000a,b,c, 2001a,b, 2003). Contrary to the standard residual income, the capital charge...
Carlo Alberto Magni
JCB
2008
108views more  JCB 2008»
15 years 4 months ago
Asymptotics of RNA Shapes
Abstract. RNA shapes, introduced by Giegerich et al. (17), provide a useful classification of the branching complexity for RNA secondary structures. In this paper, we derive an exa...
W. A. Lorenz, Yann Ponty, Peter Clote