Sciweavers

762 search results - page 11 / 153
» Finding SHA-1 Characteristics: General Results and Applicati...
Sort
View
WSC
1998
13 years 8 months ago
Application of Simulation Models in Capacity Constrained Rail Corridors
This paper focuses on the practical value of using and selecting rail simulation models to find real solutions to real problems in constrained traffic corridors. It discusses issu...
Robert H. Leilich
HPDC
2010
IEEE
13 years 8 months ago
Exploring application and infrastructure adaptation on hybrid grid-cloud infrastructure
Clouds are emerging as an important class of distributed computational resources and are quickly becoming an integral part of production computational infrastructures. An importan...
Hyunjoo Kim, Yaakoub El Khamra, Shantenu Jha, Mani...
CORR
2010
Springer
108views Education» more  CORR 2010»
13 years 7 months ago
An Analysis of Transaction and Joint-patent Application Networks
Many firms these days, forced by increasing international competition and an unstable economy, are opting to specialize rather than generalize as a way of maintaining their compet...
Hiroyasu Inoue
FC
2003
Springer
133views Cryptology» more  FC 2003»
14 years 16 days ago
Secure Generalized Vickrey Auction Using Homomorphic Encryption
Combinatorial auctions have recently attracted the interest of many researchers due to their promising applications such as the spectrum auctions recently held by the FCC. In a com...
Koutarou Suzuki, Makoto Yokoo
GIS
2005
ACM
14 years 8 months ago
Finding corresponding objects when integrating several geo-spatial datasets
When integrating geo-spatial datasets, a join algorithm is used for finding sets of corresponding objects (i.e., objects that represent the same real-world entity). Algorithms for...
Catriel Beeri, Yerach Doytsher, Yaron Kanza, Eliya...