Sciweavers

4539 search results - page 171 / 908
» Approaches to Compute Workflow Complexity
Sort
View
MCS
2007
Springer
14 years 10 months ago
Continuous and discrete homotopy operators: A theoretical approach made concrete
Using standard calculus, explicit formulas for the one-dimensional continuous and discrete homotopy operators are derived. It is shown that these formulas are equivalent to those ...
W. Hereman, Bernard Deconinck, L. D. Poole
APIN
2002
80views more  APIN 2002»
14 years 10 months ago
Searching a Scalable Approach to Cerebellar Based Control
Decades of research into the structure and function of the cerebellum have led to a clear understanding of many of its cells, as well as how learning might take place. Furthermore...
Jan Peters, P. Patrick van der Smagt
ICPPW
2009
IEEE
14 years 8 months ago
A Security-Aware Approach to JXTA-Overlay Primitives
The JXTA-Overlay project is an effort to use JXTA technology to provide a generic set of functionalities that can be used by developers to deploy P2P applications. Since its desig...
Joan Arnedo-Moreno, Keita Matsuo, Leonard Barolli,...
ICALP
2010
Springer
15 years 9 days ago
From Secrecy to Soundness: Efficient Verification via Secure Computation
d Abstract) Benny Applebaum1 , Yuval Ishai2 , and Eyal Kushilevitz3 1 Computer Science Department, Weizmann Institute of Science 2 Computer Science Department, Technion and UCLA 3 ...
Benny Applebaum, Yuval Ishai, Eyal Kushilevitz
PERCOM
2006
ACM
15 years 10 months ago
Exploiting information relationships for access control in pervasive computing
Many information services in pervasive computing offer rich information, which is information that includes other types of information. For example, the information listed in a pe...
Urs Hengartner, Peter Steenkiste