Sciweavers

14649 search results - page 2805 / 2930
» Principles of problem solving
Sort
View
SASP
2009
IEEE
291views Hardware» more  SASP 2009»
15 years 11 months ago
A parameterisable and scalable Smith-Waterman algorithm implementation on CUDA-compatible GPUs
—This paper describes a multi-threaded parallel design and implementation of the Smith-Waterman (SM) algorithm on compute unified device architecture (CUDA)-compatible graphic pr...
Cheng Ling, Khaled Benkrid, Tsuyoshi Hamada
NTMS
2009
IEEE
15 years 11 months ago
Q-ESP: A QoS-Compliant Security Protocol to Enrich IPSec Framework
—IPSec is a protocol that allows to make secure connections between branch offices and allows secure VPN accesses. However, the efforts to improve IPSec are still under way; one ...
Mahmoud Mostafa, Anas Abou El Kalam, Christian Fra...
ASIACRYPT
2009
Springer
15 years 11 months ago
Secure Multi-party Computation Minimizing Online Rounds
Multi-party secure computations are general important procedures to compute any function while keeping the security of private inputs. In this work we ask whether preprocessing can...
Seung Geol Choi, Ariel Elbaz, Tal Malkin, Moti Yun...
WINE
2009
Springer
199views Economy» more  WINE 2009»
15 years 11 months ago
Externalities in Keyword Auctions: An Empirical and Theoretical Assessment
It is widely believed that the value of acquiring a slot in a sponsored search list (that comes along with the organic links in a search engine’s result page) highly depends on ...
Renato Gomes, Nicole Immorlica, Evangelos Markakis
ATAL
2009
Springer
15 years 11 months ago
Improving adjustable autonomy strategies for time-critical domains
As agents begin to perform complex tasks alongside humans as collaborative teammates, it becomes crucial that the resulting humanmultiagent teams adapt to time-critical domains. I...
Nathan Schurr, Janusz Marecki, Milind Tambe
« Prev « First page 2805 / 2930 Last » Next »