Sciweavers

7619 search results - page 1436 / 1524
» Interaction, observance or both
Sort
View
DISOPT
2007
81views more  DISOPT 2007»
13 years 7 months ago
Strong polynomiality of resource constraint propagation
Constraint-based schedulers have been widely successful to tackle complex, disjunctive and cumulative, scheduling applications by combining tree search and constraint propagation....
Luc Mercier, Pascal Van Hentenryck
DSS
2007
226views more  DSS 2007»
13 years 7 months ago
Dare to share: Protecting sensitive knowledge with data sanitization
chool of Business Research – FY 2007 Research Abstracts Dare to Share: Protecting Sensitive Knowledge with Data Sanitization Data sanitization is a process that is used to promot...
Ali Amiri
JOC
2006
69views more  JOC 2006»
13 years 7 months ago
Characterization of Security Notions for Probabilistic Private-Key Encryption
The development of precise definitions of security for encryption, as well as a detailed understanding of their relationships, has been a major area of research in modern cryptogr...
Jonathan Katz, Moti Yung
FGCS
2007
142views more  FGCS 2007»
13 years 7 months ago
Fault tolerant high performance Information Services for dynamic collections of Grid and Web services
Abstract. E-Science Semantic Grids can often be thought of as dynamic collection of semantic subgrids where each subgrid is a collection of modest number of services that assembled...
Mehmet S. Aktas, Geoffrey Fox, Marlon E. Pierce
SP
2008
IEEE
138views Security Privacy» more  SP 2008»
13 years 7 months ago
A performance tuning methodology with compiler support
We have developed an environment, based upon robust, existing, open source software, for tuning applications written using MPI, OpenMP or both. The goal of this effort, which inte...
Oscar Hernandez, Barbara M. Chapman, Haoqiang Jin
« Prev « First page 1436 / 1524 Last » Next »