Sciweavers

880 search results - page 175 / 176
» Model checking erlang programs: the functional approach
Sort
View
ICS
2010
Tsinghua U.
14 years 3 months ago
Proof-Carrying Data and Hearsay Arguments from Signature Cards
: Design of secure systems can often be expressed as ensuring that some property is maintained at every step of a distributed computation among mutually-untrusting parties. Special...
Alessandro Chiesa, Eran Tromer
ANSS
2007
IEEE
13 years 12 months ago
JANE - The Java Ad Hoc Network Development Environment
This work describes a Java based development platform which is intended to support ad hoc network researchers in application and protocol design. Software development within this ...
Daniel Görgen, Hannes Frey, Christian Hiedels
EUROPAR
2004
Springer
13 years 11 months ago
Implementing MPI on the BlueGene/L Supercomputer
The BlueGene/L supercomputer will consist of 65,536 dual-processor compute nodes interconnected by two high-speed networks: a three-dimensional torus network and a tree topology ne...
George Almási, Charles Archer, José ...
ICALP
2004
Springer
13 years 11 months ago
The Black-Box Complexity of Nearest Neighbor Search
We define a natural notion of efficiency for approximate nearest-neighbor (ANN) search in general n-point metric spaces, namely the existence of a randomized algorithm which answ...
Robert Krauthgamer, James R. Lee
BIRTHDAY
2003
Springer
13 years 11 months ago
On the Pagination of Complex Documents
The pagination problem of complex documents is in placing text and floating objects on pages in such a way that each object appears close to, but not before, its text reference. ...
Anne Brüggemann-Klein, Rolf Klein, Stefan Woh...