Sciweavers

22 search results - page 3 / 5
» A mean field model of work stealing in large-scale systems
Sort
View
PKC
2011
Springer
219views Cryptology» more  PKC 2011»
12 years 8 months ago
Linearly Homomorphic Signatures over Binary Fields and New Tools for Lattice-Based Signatures
ded abstract of this work appears in Public Key Cryptography — PKC 2011, ed. R. Gennaro, Springer LNCS 6571 (2011), 1–16. This is the full version. We propose a linearly homom...
Dan Boneh, David Mandell Freeman
CDC
2008
IEEE
217views Control Systems» more  CDC 2008»
13 years 5 months ago
An ensemble Kalman filtering approach to highway traffic estimation using GPS enabled mobile devices
Traffic state estimation is a challenging problem for the transportation community due to the limited deployment of sensing infrastructure. However, recent trends in the mobile pho...
Daniel B. Work, Olli-Pekka Tossavainen, Sebastien ...
IJON
2008
186views more  IJON 2008»
13 years 5 months ago
Computational analysis and learning for a biologically motivated model of boundary detection
In this work we address the problem of boundary detection by combining ideas and approaches from biological and computational vision. Initially, we propose a simple and efficient ...
Iasonas Kokkinos, Rachid Deriche, Olivier D. Fauge...
ICDCS
2012
IEEE
11 years 7 months ago
Combining Partial Redundancy and Checkpointing for HPC
Today’s largest High Performance Computing (HPC) systems exceed one Petaflops (1015 floating point operations per second) and exascale systems are projected within seven years...
James Elliott, Kishor Kharbas, David Fiala, Frank ...
EDOC
2006
IEEE
13 years 11 months ago
Situations in Conceptual Modeling of Context
In previous work, we have defined conceptual foundations that can be beneficially used in context modeling. These conceptual foundations include the separation of entity and conte...
Patricia Dockhorn Costa, Giancarlo Guizzardi, Jo&a...