Sciweavers

1205 search results - page 112 / 241
» On P Systems with Bounded Parallelism
Sort
View
119
Voted
CONCUR
2008
Springer
15 years 5 months ago
Modeling Computational Security in Long-Lived Systems
Abstract. For many cryptographic protocols, security relies on the assumption that adversarial entities have limited computational power. This type of security degrades progressive...
Ran Canetti, Ling Cheung, Dilsun Kirli Kaynar, Nan...
126
Voted
PODC
2009
ACM
16 years 4 months ago
Correctness of gossip-based membership under message loss
Due to their simplicity and effectiveness, gossip-based membership protocols have become the method of choice for maintaining partial membership in large P2P systems. A variety of...
Maxim Gurevich, Idit Keidar
HPDC
2010
IEEE
15 years 4 months ago
Towards optimising distributed data streaming graphs using parallel streams
Modern scientific collaborations have opened up the opportunity of solving complex problems that involve multidisciplinary expertise and large-scale computational experiments. The...
Chee Sun Liew, Malcolm P. Atkinson, Jano I. van He...
IJCAI
1989
15 years 4 months ago
Decision-Making in an Embedded Reasoning System
The developmentof reasoning systems that can reason and plan in a continuously changing environment is emerging as an important area of research in Arti cial Intelligence. Thispap...
Michael P. Georgeff, François Felix Ingrand
132
Voted
CF
2009
ACM
15 years 8 months ago
Non-clairvoyant speed scaling for batched parallel jobs on multiprocessors
Energy consumption and heat dissipation have become key considerations for modern high performance computer systems. In this paper, we focus on non-clairvoyant speed scaling to mi...
Hongyang Sun, Yangjie Cao, Wen-Jing Hsu