Sciweavers

886 search results - page 37 / 178
» Generalized Bezout Identity
Sort
View
SAINT
2003
IEEE
14 years 2 months ago
Distributed Authentication for Peer-to-Peer Networks
A public key infrastructure is generally (and effectively) used for cryptographically secure authentication in the networks. Ad-hoc networks are formed in haphazard manner. Securi...
Shardul Gokhale, Partha Dasgupta
DATE
2002
IEEE
242views Hardware» more  DATE 2002»
14 years 2 months ago
Automatic Generation of Common-Centroid Capacitor Arrays with Arbitrary Capacitor Ratio
The key performance of many analog circuits is directly related to accurate capacitor ratios. It is well known that capacitor ratio precision is greatly enhanced by paralleling id...
Mohamed Dessouky, DiaaEldin Sayed
IJCAI
2007
13 years 10 months ago
r-grams: Relational Grams
We introduce relational grams (r-grams). They upgrade n-grams for modeling relational sequences of atoms. As n-grams, r-grams are based on smoothed n-th order Markov chains. Smoot...
Niels Landwehr, Luc De Raedt
CORR
2006
Springer
91views Education» more  CORR 2006»
13 years 9 months ago
The Complexity of Mean Flow Time Scheduling Problems with Release Times
We study the problem of preemptive scheduling n jobs with given release times on m identical parallel machines. The objective is to minimize the average flow time. We show that wh...
Philippe Baptiste, Peter Brucker, Marek Chrobak, C...
IPL
2008
103views more  IPL 2008»
13 years 9 months ago
New efficiency results for makespan cost sharing
In the context of scheduling, we study social cost efficiency for a cost-sharing problem in which the service provider's cost is determined by the makespan of the served agen...
Yvonne Bleischwitz, Florian Schoppmann