Sciweavers

813 search results - page 62 / 163
» Pipeline-centric provenance model
Sort
View
NIPS
2007
13 years 11 months ago
Fixing Max-Product: Convergent Message Passing Algorithms for MAP LP-Relaxations
We present a novel message passing algorithm for approximating the MAP problem in graphical models. The algorithm is similar in structure to max-product but unlike max-product it ...
Amir Globerson, Tommi Jaakkola
CCS
2007
ACM
14 years 4 months ago
Security under key-dependent inputs
In this work we re-visit the question of building cryptographic primitives that remain secure even when queried on inputs that depend on the secret key. This was investigated by B...
Shai Halevi, Hugo Krawczyk
GRID
2004
Springer
14 years 3 months ago
On The Feasibility of Running Entity-Level Simulations on Grid Platforms
Scientists have long relied on abstract models to study phenomena that are too complex for direct observation and experimentation. As new scientific modeling methodologies emerge...
Alan Su, Francine Berman, Henri Casanova
TON
2010
127views more  TON 2010»
13 years 4 months ago
Approximation Algorithms for Wireless Link Scheduling With SINR-Based Interference
In this paper, we consider the classical problem of link scheduling in wireless networks under an accurate interference model, in which correct packet reception at a receiver node ...
Douglas M. Blough, Giovanni Resta, Paolo Santi
GI
2005
Springer
14 years 3 months ago
Automated Quality Assurance for UML Models
Abstract: Model based development, like proposed by the OMG’s Model Driven Arre (MDA), aims to raise the level of abstraction from working on the code to working with models. For...
Tilman Seifert, Florian Jug, Günther Rackl