Sciweavers

1898 search results - page 361 / 380
» Weak Keys for IDEA
Sort
View
ENTCS
2006
150views more  ENTCS 2006»
13 years 8 months ago
Causality Versus True-Concurrency
Category theory has been successfully employed to structure the confusing setup of models and equivalences for concurrency: Winskel and Nielsen have related the standard models nc...
Sibylle B. Fröschle, Slawomir Lasota
EOR
2006
135views more  EOR 2006»
13 years 8 months ago
Principles of scatter search
Scatter search is an evolutionary method that has been successfully applied to hard optimization problems. The fundamental concepts and principles of the method were first propose...
Rafael Martí, Manuel Laguna, Fred Glover
ESWA
2006
176views more  ESWA 2006»
13 years 8 months ago
Build grid-enabled large-scale collaboration environment in e-Learning grid
As a new branch of grid computing, e-Learning grid is emerging as a nationwide e-Learning infrastructure, which can provide innovative learning experience for learners. In such a ...
YuShun Li, ShengWen Yang, Jinlei Jiang, Meilin Shi
ISCA
2008
IEEE
185views Hardware» more  ISCA 2008»
13 years 8 months ago
From Speculation to Security: Practical and Efficient Information Flow Tracking Using Speculative Hardware
Dynamic information flow tracking (also known as taint tracking) is an appealing approach to combat various security attacks. However, the performance of applications can severely...
Haibo Chen, Xi Wu, Liwei Yuan, Binyu Zang, Pen-Chu...
IJSNET
2006
107views more  IJSNET 2006»
13 years 8 months ago
In-network aggregation trade-offs for data collection in wireless sensor networks
This paper explores in-network aggregation as a power-efficient mechanism for collecting data in wireless sensor networks. In particular, we focus on sensor network scenarios wher...
Ignacio Solis, Katia Obraczka