Sciweavers

82 search results - page 11 / 17
» Roundings Respecting Hard Constraints
Sort
View
CHI
2001
ACM
14 years 7 months ago
Ignoring perfect knowledge in-the-world for imperfect knowledge in-the-head
Constraints and dependencies among the elements of embodied cognition form patterns or microstrategies of interactive behavior. Hard constraints determine which microstrategies ar...
Wayne D. Gray, Wai-Tat Fu
CTRSA
2010
Springer
191views Cryptology» more  CTRSA 2010»
13 years 10 months ago
Making the Diffie-Hellman Protocol Identity-Based
This paper presents a new identity based key agreement protocol. In id-based cryptography (introduced by Adi Shamir in [33]) each party uses its own identity as public key and rece...
Dario Fiore, Rosario Gennaro
DCEIS
2006
13 years 8 months ago
Semantic Coherence in Software Engineering
During software engineering processes lots of artifacts are produced to document the development of a concrete software. For artifacts which are related with respect to their meani...
Michael Skusa
MST
2010
187views more  MST 2010»
13 years 2 months ago
Distributed Approximation of Capacitated Dominating Sets
We study local, distributed algorithms for the capacitated minimum dominating set (CapMDS) problem, which arises in various distributed network applications. Given a network graph...
Fabian Kuhn, Thomas Moscibroda
EMSOFT
2010
Springer
13 years 5 months ago
Reducing stack with intra-task threshold priorities in real-time systems
In the design of hard real-time systems, the feasibility of the task set is one of the primary concerns. However, in embedded systems with scarce resources, optimizing resource us...
Gang Yao, Giorgio C. Buttazzo