Sciweavers

375 search results - page 39 / 75
» Implementation Alternatives for Bottom-Up Evaluation
Sort
View
NSDI
2008
15 years 7 months ago
Passport: Secure and Adoptable Source Authentication
We present the design and evaluation of Passport, a system that allows source addresses to be validated within the network. Passport uses efficient, symmetric-key cryptography to ...
Xin Liu, Ang Li, Xiaowei Yang, David Wetherall
HEURISTICS
2008
136views more  HEURISTICS 2008»
15 years 3 months ago
Enhancing set constraint solvers with lexicographic bounds
Since their beginning in constraint programming, set solvers have been applied to a wide range of combinatorial search problems, such as bin-packing, set partitioning, circuit desi...
Andrew Sadler, Carmen Gervet
DGO
2008
131views Education» more  DGO 2008»
15 years 6 months ago
A domain-specific language for urban simulation variables
UrbanSim is a modeling system for simulating the development of urban regions over periods of 20-30 years. Its purpose is to help evaluate alternative proposed policies and transp...
Alan Borning, Hana Sevcikova, Paul Waddell
JAR
2006
236views more  JAR 2006»
15 years 4 months ago
Deciding Boolean Algebra with Presburger Arithmetic
We describe an algorithm for deciding the first-order multisorted theory BAPA, which combines 1) Boolean algebras of sets of uninterpreted elements (BA) and 2) Presburger arithmeti...
Viktor Kuncak, Huu Hai Nguyen, Martin C. Rinard
155
Voted
MANSCI
2007
90views more  MANSCI 2007»
15 years 4 months ago
Selecting a Selection Procedure
Selection procedures are used in a variety of applications to select the best of a finite set of alternatives. ‘Best’ is defined with respect to the largest mean, but the me...
Jürgen Branke, Stephen E. Chick, Christian Sc...