Sciweavers

430 search results - page 48 / 86
» Efficient Proving for Practical Distributed Access-Control S...
Sort
View
131
Voted
PIMRC
2008
IEEE
15 years 9 months ago
The limits of theory: Pragmatic challenges in mobile ad hoc systems
—The development of mobile ad hoc systems have considerably emphasized the need for a better understanding of the factors that influence the systems’ performance, i.e., mobili...
Franck Legendre, Martin May, Vincent Lenders, Gunn...
121
Voted
CISC
2008
Springer
117views Cryptology» more  CISC 2008»
15 years 4 months ago
Strong Anonymous Signatures
The notion of anonymous signatures has recently been formalized by [18], which captures an interesting property that a digital signature can sometimes hide the identity of the sign...
Rui Zhang 0002, Hideki Imai
118
Voted
ICANNGA
2007
Springer
134views Algorithms» more  ICANNGA 2007»
15 years 4 months ago
Optical Design with Epsilon-Dominated Multi-objective Evolutionary Algorithm
Significant improvement over a patented lens design is achieved using multi-objective evolutionary optimization. A comparison of the results obtained from NSGA2 and ε-MOEA is done...
Shaine Joseph, Hyung W. Kang, Uday K. Chakraborty
113
Voted
DSE
1998
80views more  DSE 1998»
15 years 2 months ago
The Voltan application programming environment for fail-silent processes
The Voltan software library for building distributed applications provides the support for (i) a processpair to act as single Voltan self-checking ‘fail-silent’ process; and (...
Dave Black, C. Low, Santosh K. Shrivastava
130
Voted
CLUSTER
2009
IEEE
15 years 6 months ago
Analytical modeling and optimization for affinity based thread scheduling on multicore systems
Abstract--This paper proposes an analytical model to estimate the cost of running an affinity-based thread schedule on multicore systems. The model consists of three submodels to e...
Fengguang Song, Shirley Moore, Jack Dongarra