Sciweavers

1662 search results - page 39 / 333
» Privately Finding Specifications
Sort
View
HPCA
2006
IEEE
14 years 11 months ago
Last level cache (LLC) performance of data mining workloads on a CMP - a case study of parallel bioinformatics workloads
With the continuing growth in the amount of genetic data, members of the bioinformatics community are developing a variety of data-mining applications to understand the data and d...
Aamer Jaleel, Matthew Mattina, Bruce L. Jacob
IFIP
2009
Springer
14 years 3 months ago
Supporting Cross-Organizational Process Control
E-contracts express the rights and obligations of parties through a formal, digital representation of the contract provisions. In process intensive relationships, e-contracts conta...
Samuil Angelov, Jochem Vonk, Krishnamurthy Vidyasa...
CORR
2010
Springer
107views Education» more  CORR 2010»
13 years 11 months ago
mVideoCast: Mobile, real time ROI detection and streaming
A variety of applications are emerging to support streaming video from mobile devices. However, many tasks can benefit from streaming specific content rather than the full video f...
Scott Carter, Laurent Denoue, John Adcock
GECCO
2000
Springer
141views Optimization» more  GECCO 2000»
14 years 2 months ago
A steady-state evolutionary algorithm for the job shop problem
This paper describes an evolutionary search scheduling algorithm (ESSA) for the job shop scheduling problem (JSSP). If no specific knowledge of the problem is included in the EA t...
Patrick van Bael, Dirk Devogelaere, Marcel Rijckae...
JSW
2008
118views more  JSW 2008»
13 years 10 months ago
Deciding the Correctness of Attacks on Authentication Protocols
A new tool for automated validation of attacks on authentication protocols has been used to find several errors and ambiguities in the list of attacks described in the well known r...
Anders Moen Hagalisletto