Sciweavers

229 search results - page 24 / 46
» Set Covering Problems in Role-Based Access Control
Sort
View
23
Voted
EUROCRYPT
1998
Springer
13 years 12 months ago
Quorum-Based Secure Multi-party Computation
Abstract. This paper describes e cient protocols for multi-party computations that are information-theoretically secure against passive attacks. The results presented here apply to...
Donald Beaver, Avishai Wool
RTSS
1992
IEEE
13 years 11 months ago
Scheduling Sporadic Tasks with Shared Resources in Hard-Real-Time Systems
The problem of scheduling a set of sporadic tasks that share a set of serially reusable, single unit software resources on a single processor is considered. The correctness condit...
Kevin Jeffay
GEOINFORMATICA
2008
135views more  GEOINFORMATICA 2008»
13 years 7 months ago
Automatically and Accurately Conflating Raster Maps with Orthoimagery
Recent growth of geospatial information online has made it possible to access various maps and orthoimagery. Conflating these maps and imagery can create images that combine the vi...
Ching-Chien Chen, Craig A. Knoblock, Cyrus Shahabi
NAR
2008
87views more  NAR 2008»
13 years 7 months ago
The CGView Server: a comparative genomics tool for circular genomes
The CGView Server generates graphical maps of circular genomes that show sequence features, base composition plots, analysis results and sequence similarity plots. Sequences can b...
Jason R. Grant, Paul Stothard
PPSN
2004
Springer
14 years 1 months ago
Multi-objective Optimisation by Co-operative Co-evolution
This paper presents the integration between a co-operative co-evolutionary genetic algorithm (CCGA) and four evolutionary multiobjective optimisation algorithms (EMOAs): a multi-ob...
Kuntinee Maneeratana, Kittipong Boonlong, Nachol C...