Sciweavers

1045 search results - page 119 / 209
» The Use of Exceptions
Sort
View
148
Voted
CISC
2008
Springer
152views Cryptology» more  CISC 2008»
15 years 4 months ago
Privacy for Private Key in Signatures
One of the important applications of digital signature is anonymous credential or pseudonym system. In these scenarios, it is essential that the identity of the signer is kept secr...
Qianhong Wu, Bo Qin, Yi Mu, Willy Susilo
117
Voted
ATMOS
2007
163views Optimization» more  ATMOS 2007»
15 years 4 months ago
Branching Strategies to Improve Regularity of Crew Schedules in Ex-Urban Public Transit
We discuss timetables in ex-urban bus traffic that consist of many trips serviced every day together with some exceptions that do not repeat daily. Traditional optimization methods...
Ingmar Steinzen, Leena Suhl, Natalia Kliewer
106
Voted
CIDR
2007
105views Algorithms» more  CIDR 2007»
15 years 4 months ago
Turning Cluster Management into Data Management; A System Overview
This paper introduces the CondorJ2 cluster management system. Traditionally, cluster management systems such as Condor employ a process-oriented approach with little or no use of ...
Eric Robinson, David J. DeWitt
115
Voted
ACL
2006
15 years 4 months ago
Maximum Entropy Based Restoration of Arabic Diacritics
Short vowels and other diacritics are not part of written Arabic scripts. Exceptions are made for important political and religious texts and in scripts for beginning students of ...
Imed Zitouni, Jeffrey S. Sorensen, Ruhi Sarikaya
122
Voted
MODELLIERUNG
2004
15 years 4 months ago
CASE Support and Model-Based Development
ion from the implementation they use. Some tools rather consequently use this abstract model; others at least partly keep the implementational view, modeling components, e.g., by o...
Bernhard Schätz, Jan Romberg, Oscar Slotosch,...