Sciweavers

669 search results - page 30 / 134
» Mastering the Master Theorem
Sort
View
JPDC
2006
133views more  JPDC 2006»
13 years 7 months ago
Grid computing for parallel bioinspired algorithms
This paper focuses on solving large size combinatorial optimization problems using a Grid-enabled framework called ParadisEO
Nouredine Melab, Sébastien Cahon, El-Ghazal...
CLUSTER
2002
IEEE
13 years 7 months ago
CEJVM: "Cluster Enabled Java Virtual Machine"
CEJVM is a cluster enabled Java Virtual Machine, which executes in a distributed fashion among collaborating nodes of a dedicated cluster. It extends Java`s multithreading mechani...
Muhammad Umar Janjua, Mehboob Yasin, Ch. Falak She...
CP
2010
Springer
13 years 6 months ago
Checking-Up on Branch-and-Check
Abstract. Branch-and-Check, introduced ten years ago, is a generalization of logic-based Benders decomposition. The key extension is to solve the Benders sub-problems at each feasi...
J. Christopher Beck
PODC
2009
ACM
14 years 8 months ago
Vertical paxos and primary-backup replication
We introduce a class of Paxos algorithms called Vertical Paxos, in which reconfiguration can occur in the middle of reaching agreement on an individual state-machine command. Vert...
Leslie Lamport, Dahlia Malkhi, Lidong Zhou
TCC
2009
Springer
114views Cryptology» more  TCC 2009»
14 years 8 months ago
Predicate Privacy in Encryption Systems
Predicate encryption is a new encryption paradigm which gives a master secret key owner fine-grained control over access to encrypted data. The master secret key owner can generat...
Emily Shen, Elaine Shi, Brent Waters