Sciweavers

1558 search results - page 223 / 312
» Scalable work stealing
Sort
View
FLAIRS
2006
13 years 10 months ago
Inexact Graph Matching: A Case of Study
Inexact graph matching has become an important research area because it is used to find similarities among objects in several real domains such as chemical and biological compound...
Ivan Olmos, Jesus A. Gonzalez, Mauricio Osorio
ICISC
2004
127views Cryptology» more  ICISC 2004»
13 years 10 months ago
Identity-Based Access Control for Ad Hoc Groups
Abstract. The proliferation of group-centric computing and communication motivates the need for mechanisms to provide group access control. Group access control includes mechanisms...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
DGO
2003
153views Education» more  DGO 2003»
13 years 10 months ago
Improving Access to Large Volumes of Online Data
The Internet has recently become the medium of interaction with large volumes of data. Enterprises in the public and private sectors made their databases available over the Intern...
Egemen Tanin, Hanan Samet
EJC
2003
13 years 10 months ago
An Algebraic Approach for Specifying Compound Terms in Faceted Taxonomies
Abstract. A faceted taxonomy is a set of taxonomies, each describing a given domain from a different aspect, or facet. The indexing of domain objects is done through conjunctive c...
Yannis Tzitzikas, Anastasia Analyti, Nicolas Spyra...
FAST
2003
13 years 10 months ago
Block-Level Security for Network-Attached Disks
We propose a practical and efficient method for adding security to network-attached disks (NADs). In contrast to previous work, our design requires no changes to the data layout ...
Marcos Kawazoe Aguilera, Minwen Ji, Mark Lillibrid...