Sciweavers

2038 search results - page 86 / 408
» Loops under Strategies
Sort
View
RECOMB
2002
Springer
16 years 4 months ago
Provably sensitive Indexing strategies for biosequence similarity search
The field of algorithms for pairwisc biosequence similarity search is dominated by heuristic methods of high efficiency but uncertain sensitivity. One reason that more formal stri...
Jeremy Buhler
119
Voted
CDC
2008
IEEE
180views Control Systems» more  CDC 2008»
15 years 10 months ago
Opacity-enforcing supervisory strategies for secure discrete event systems
— Initial-state opacity emerges as a key property in numerous security applications of discrete event systems including key-stream generators for cryptographic protocols. Speciï¬...
Anooshiravan Saboori, Christoforos N. Hadjicostis
IAT
2008
IEEE
15 years 10 months ago
Beyond Quasi-linear Utility: Strategy/False-Name-Proof Multi-unit Auction Protocols
We develop strategy/false-name-proof multi-unit auction protocols for non-quasi-linear utilities. One almost universal assumption in auction theory literature is that each bidder ...
Yuko Sakurai, Yasumasa Saito, Atsushi Iwasaki, Mak...
111
Voted
PRDC
2008
IEEE
15 years 10 months ago
VTV - A Voting Strategy for Real-Time Systems
Real-time applications typically have to satisfy high dependability requirements and require fault tolerance in both value and time domains. A widely used approach to ensure fault...
Hüseyin Aysan, Sasikumar Punnekkat, Radu Dobr...
146
Voted
QEST
2007
IEEE
15 years 10 months ago
A Petri Net Model for Evaluating Packet Buffering Strategies in a Network Processor
Previous studies have shown that buffering packets in DRAM is a performance bottleneck. In order to understand the impediments in accessing the DRAM, we developed a detailed Petri...
Girish B. C., R. Govindarajan