Sciweavers

12084 search results - page 2389 / 2417
» Effect Systems with Subtyping
Sort
View
JAR
2000
145views more  JAR 2000»
13 years 7 months ago
Logical Cryptanalysis as a SAT Problem
Cryptographic algorithms play a key role in computer security and the formal analysis of their robustness is of utmost importance. Yet, logic and automated reasoning tools are seld...
Fabio Massacci, Laura Marraro
JHSN
2000
112views more  JHSN 2000»
13 years 7 months ago
A hierarchical Quality of Service control architecture for configurable multimedia applications
In order to achieve the best application-level Quality-of-Service (QoS), multimedia applications need to be dynamically tuned and reconfigured to adapt to fluctuating computing an...
Baochun Li, William Kalter, Klara Nahrstedt
JSA
2000
115views more  JSA 2000»
13 years 7 months ago
Scheduling optimization through iterative refinement
Scheduling DAGs with communication times is the theoretical basis for achieving efficient parallelism on distributed memory systems. We generalize Graham's task-level in a ma...
Mayez A. Al-Mouhamed, Adel Al-Massarani
PRESENCE
2000
145views more  PRESENCE 2000»
13 years 7 months ago
Control Design and Task Performance in Endoscopic Tele-Operation
Endoscopic surgery, while offering considerable gains for the patient, has created new difficulties for the surgeon. One problem is the fulcrum effect, which causes the movement o...
Ori Ben-Porat, Moshe Shoham, Joachim Meyer
CACM
1998
110views more  CACM 1998»
13 years 7 months ago
Viewing WISs as Database Applications
abstraction for modeling these problems is to view the Web as a collection of (usually small and heterogeneous) databases, and to view programs that extract and process Web data au...
Gustavo O. Arocena, Alberto O. Mendelzon
« Prev « First page 2389 / 2417 Last » Next »