Sciweavers

1094 search results - page 153 / 219
» One Size Fits All
Sort
View
COR
2011
13 years 4 months ago
MIP models for connected facility location: A theoretical and computational study
This article comprises the first theoretical and computational study on mixed integer programming (MIP) models for the connected facility location problem (ConFL). ConFL combines...
Stefan Gollowitzer, Ivana Ljubic
ACTA
2011
13 years 3 months ago
Nonatomic dual bakery algorithm with bounded tokens
A simple mutual exclusion algorithm is presented that only uses nonatomic shared variables of bounded size, and that satisfies bounded overtaking. When the shared variables behave...
Alex A. Aravind, Wim H. Hesselink
SIAMDM
2010
131views more  SIAMDM 2010»
13 years 3 months ago
On Optimal Strategies for a Hat Game on Graphs
The following problem was introduced by Marcin Krzywkowski as a generalization of a problem of Todd Ebert. After initially coordinating a strategy, n players each occupy a differe...
Uriel Feige
NAR
2011
225views Computer Vision» more  NAR 2011»
12 years 11 months ago
PHOSIDA 2011: the posttranslational modification database
The primary purpose of PHOSIDA (http://www .phosida.com) is to manage posttranslational modification sites of various species ranging from bacteria to human. Since its last report...
Florian Gnad, Jeremy Gunawardena, Matthias Mann 00...
ASIACRYPT
2011
Springer
12 years 9 months ago
Short Signatures from Weaker Assumptions
We provide constructions of (m, 1)-programmable hash functions (PHFs) for m ≥ 2. Mimicking certain programmability properties of random oracles, PHFs can, e.g., be plugged into ...
Dennis Hofheinz, Tibor Jager, Eike Kiltz