Sciweavers

1064 search results - page 181 / 213
» Disjoint Systems (Extended Abstract)
Sort
View
151
Voted
AAECC
2007
Springer
111views Algorithms» more  AAECC 2007»
15 years 3 months ago
When cache blocking of sparse matrix vector multiply works and why
Abstract. We present new performance models and a new, more compact data structure for cache blocking when applied to the sparse matrixvector multiply (SpM×V) operation, y ← y +...
Rajesh Nishtala, Richard W. Vuduc, James Demmel, K...
AAMAS
2008
Springer
15 years 3 months ago
Logic-based automated multi-issue bilateral negotiation in peer-to-peer e-marketplaces
Abstract. We present a novel logic-based framework to automate multi-issue bilateral negotiation in e-commerce settings. The approach exploits logic as communication language among...
Azzurra Ragone, Tommaso Di Noia, Eugenio Di Sciasc...
FAC
2008
80views more  FAC 2008»
15 years 3 months ago
Verification of Mondex electronic purses with KIV: from transactions to a security protocol
The Mondex case study about the specification and refinement of an electronic purse as defined in the Oxford Technical Monograph PRG-126 has recently been proposed as a challenge f...
Dominik Haneberg, Gerhard Schellhorn, Holger Grand...
ITSSA
2006
98views more  ITSSA 2006»
15 years 3 months ago
Agent-Oriented Data Curation in Bioinformatics
Abstract. The practitioners of bioinformatics require increasing sophistication from their software tools to take into account the particular characteristics that make their domain...
Simon Miles
JHSN
2006
267views more  JHSN 2006»
15 years 3 months ago
Client-side access control enforcement using trusted computing and PEI models
It has been recognized for some time that software alone does not provide an adequate foundation for building a high-assurance trusted platform. The emergence of industry-standard ...
Ravi S. Sandhu, Xinwen Zhang, Kumar Ranganathan, M...