Sciweavers

1723 search results - page 205 / 345
» Generalized file system dependencies
Sort
View
QSIC
2005
IEEE
15 years 10 months ago
Proving the Safety of SQL Queries
Many programs need to access data in a relational database. This is usually done by means of queries written in SQL. Although the language SQL is declarative, certain runtime erro...
Stefan Brass, Christian Goldberg
NPC
2005
Springer
15 years 10 months ago
A Performance-Based Parallel Loop Self-scheduling on Grid Computing Environments
Efficient loop scheduling on parallel and distributed systems depends mostly on load balancing, especially on heterogeneous PC-based cluster and grid computing environments. In thi...
Wen-Chung Shih, Chao-Tung Yang, Shian-Shyong Tseng
TCC
2005
Springer
118views Cryptology» more  TCC 2005»
15 years 10 months ago
On the Relationships Between Notions of Simulation-Based Security
Several compositional forms of simulation-based security have been proposed in the literature, including universal composability, black-box simulatability, and variants thereof. Th...
Anupam Datta, Ralf Küsters, John C. Mitchell,...
SIGMETRICS
2004
ACM
15 years 10 months ago
Insensitive load balancing
A large variety of communication systems, including telephone and data networks, can be represented by so-called Whittle networks. The stationary distribution of these networks is...
Thomas Bonald, Matthieu Jonckheere, Alexandre Prou...
ATAL
2004
Springer
15 years 10 months ago
Desires, Norms and Constraints
This paper deals with modeling mental states of a rational agent, in particular states based on agent’s desires. It shows that the world the agent belongs to forces it to restri...
Laurence Cholvy, Christophe Garion