Sciweavers

3333 search results - page 660 / 667
» New Invariants for Groups
Sort
View
WCRE
2010
IEEE
13 years 5 months ago
Visually Supporting Source Code Changes Integration: The Torch Dashboard
—Automatic and advanced merging algorithms help programmers to merge their modifications in main development repositories. However, there is little support to help release maste...
Veroonica Uquillas Gomez, Stéphane Ducasse,...
CANS
2010
Springer
150views Cryptology» more  CANS 2010»
13 years 5 months ago
Predicate Encryption with Partial Public Keys
Abstract. Predicate encryption is a new powerful cryptographic primitive which allows for fine-grained access control for encrypted data: the owner of the secret key can release pa...
Carlo Blundo, Vincenzo Iovino, Giuseppe Persiano
IPPS
2010
IEEE
13 years 5 months ago
On the parallelisation of MCMC-based image processing
Abstract--The increasing availability of multi-core and multiprocessor architectures provides new opportunities for improving the performance of many computer simulations. Markov C...
Jonathan M. R. Byrd, Stephen A. Jarvis, Abhir H. B...
MICRO
2010
IEEE
210views Hardware» more  MICRO 2010»
13 years 5 months ago
Thread Cluster Memory Scheduling: Exploiting Differences in Memory Access Behavior
In a modern chip-multiprocessor system, memory is a shared resource among multiple concurrently executing threads. The memory scheduling algorithm should resolve memory contention...
Yoongu Kim, Michael Papamichael, Onur Mutlu, Mor H...
MOBIHOC
2010
ACM
13 years 5 months ago
Breaking bidder collusion in large-scale spectrum auctions
Dynamic spectrum auction is an effective solution to provide spectrum on-demand to many small wireless networks. As the number of participants grows, bidder collusion becomes a se...
Xia Zhou, Haitao Zheng