Sciweavers

4565 search results - page 880 / 913
» Time Optimal Self-Stabilizing Algorithms
Sort
View
CCS
2003
ACM
14 years 27 days ago
Cryptographic tamper evidence
We propose a new notion of cryptographic tamper evidence. A tamper-evident signature scheme provides an additional procedure Div which detects tampering: given two signatures, Div...
Gene Itkis
CP
2003
Springer
14 years 27 days ago
Incremental Computation of Resource-Envelopes in Producer-Consumer Models
Abstract. Interleaved planning and scheduling employs the idea of extending partial plans by regularly heeding to the scheduling constraints during search. One of the techniques us...
T. K. Satish Kumar
SPAA
1993
ACM
13 years 11 months ago
Supporting Sets of Arbitrary Connections on iWarp Through Communication Context Switches
In this paper we introduce the ConSet communication model for distributed memory parallel computers. The communication needs of an application program can be satisfied by some ar...
Anja Feldmann, Thomas Stricker, Thomas E. Warfel
ICC
2007
IEEE
13 years 11 months ago
The Impact of Avatar Mobility on Distributed Server Assignment for Delivering Mobile Immersive Communication Environment
In our previous work, we proposed a distributed server architecture to deliver multi-party immersive voice communication service to mobile clients (e.g. Sony PSP) accessing a Distr...
Ying Peng Que, Farzad Safaei, Paul Boustead
DGO
2008
170views Education» more  DGO 2008»
13 years 9 months ago
Natural language processing and e-Government: crime information extraction from heterogeneous data sources
Much information that could help solve and prevent crimes is never gathered because the reporting methods available to citizens and law enforcement personnel are not optimal. Dete...
Chih Hao Ku, Alicia Iriberri, Gondy Leroy