Sciweavers

1045 search results - page 119 / 209
» The Use of Exceptions
Sort
View
CISC
2008
Springer
152views Cryptology» more  CISC 2008»
13 years 10 months ago
Privacy for Private Key in Signatures
One of the important applications of digital signature is anonymous credential or pseudonym system. In these scenarios, it is essential that the identity of the signer is kept secr...
Qianhong Wu, Bo Qin, Yi Mu, Willy Susilo
ATMOS
2007
163views Optimization» more  ATMOS 2007»
13 years 9 months ago
Branching Strategies to Improve Regularity of Crew Schedules in Ex-Urban Public Transit
We discuss timetables in ex-urban bus traffic that consist of many trips serviced every day together with some exceptions that do not repeat daily. Traditional optimization methods...
Ingmar Steinzen, Leena Suhl, Natalia Kliewer
CIDR
2007
105views Algorithms» more  CIDR 2007»
13 years 9 months ago
Turning Cluster Management into Data Management; A System Overview
This paper introduces the CondorJ2 cluster management system. Traditionally, cluster management systems such as Condor employ a process-oriented approach with little or no use of ...
Eric Robinson, David J. DeWitt
ACL
2006
13 years 9 months ago
Maximum Entropy Based Restoration of Arabic Diacritics
Short vowels and other diacritics are not part of written Arabic scripts. Exceptions are made for important political and religious texts and in scripts for beginning students of ...
Imed Zitouni, Jeffrey S. Sorensen, Ruhi Sarikaya
MODELLIERUNG
2004
13 years 9 months ago
CASE Support and Model-Based Development
ion from the implementation they use. Some tools rather consequently use this abstract model; others at least partly keep the implementational view, modeling components, e.g., by o...
Bernhard Schätz, Jan Romberg, Oscar Slotosch,...