Sciweavers

1917 search results - page 272 / 384
» User Model and Utility Based Power Management
Sort
View
GCC
2003
Springer
14 years 2 months ago
Constructing Secure Web Service Based on XML
The paper discusses XML security key technologies related with security of Web service. Based on these discussions, Web service is integrated with some mature security architecture...
Shaomin Zhang, Baoyi Wang, Lihua Zhou
CONSTRAINTS
2004
116views more  CONSTRAINTS 2004»
13 years 9 months ago
Decision Tradeoff Using Example-Critiquing and Constraint Programming
We consider constructive preference elicitation for decision aid systems in applications such as configuration or electronic catalogs. We are particularly interested in supporting ...
Pearl Pu, Boi Faltings
SDM
2009
SIAM
129views Data Mining» more  SDM 2009»
14 years 6 months ago
Multi-topic Based Query-Oriented Summarization.
Query-oriented summarization aims at extracting an informative summary from a document collection for a given query. It is very useful to help users grasp the main information rel...
Dewei Chen, Jie Tang, Limin Yao
ACMICEC
2007
ACM
201views ECommerce» more  ACMICEC 2007»
14 years 1 months ago
Bid based scheduler with backfilling for a multiprocessor system
We consider a virtual computing environment that provides computational resources on demand to users with multiattribute task descriptions that include a valuation, resource (CPU)...
Inbal Yahav, Louiqa Raschid, Henrique Andrade
ACISP
2001
Springer
14 years 1 months ago
Private Information Retrieval Based on the Subgroup Membership Problem
Abstract. Many algorithmic problems, which are used to prove the security of a cryptographic system, are shown to be characterized as the subgroup membership problem. We then apply...
Akihiro Yamamura, Taiichi Saito