Sciweavers

473 search results - page 54 / 95
» Computing excluded minors
Sort
View
98
Voted
PSD
2010
Springer
109views Database» more  PSD 2010»
14 years 11 months ago
A Tool for Analyzing and Fixing Infeasible RCTA Instances
Minimum-distance controlled tabular adjustment methods (CTA), and its restricted variants (RCTA), is a recent perturbative approach for tabular data protection. Given a table to be...
Jordi Castro, José A. González
93
Voted
WINE
2010
Springer
148views Economy» more  WINE 2010»
14 years 10 months ago
False-Name-Proofness in Social Networks
In mechanism design, the goal is to create rules for making a decision based on the preferences of multiple parties (agents), while taking into account that agents may behave stra...
Vincent Conitzer, Nicole Immorlica, Joshua Letchfo...
92
Voted
JCC
2011
87views more  JCC 2011»
14 years 7 months ago
NUPACK: Analysis and design of nucleic acid systems
: The Nucleic Acid Package (NUPACK) is a growing software suite for the analysis and design of nucleic acid systems. The NUPACK web server (http://www.nupack.org) currently enables...
Joseph N. Zadeh, Conrad Steenberg, Justin S. Bois,...
166
Voted
CCS
2011
ACM
14 years 14 days ago
Eliminating the hypervisor attack surface for a more secure cloud
Cloud computing is quickly becoming the platform of choice for many web services. Virtualization is the key underlying technology enabling cloud providers to host services for a l...
Jakub Szefer, Eric Keller, Ruby B. Lee, Jennifer R...
IPPS
2008
IEEE
15 years 7 months ago
Programmability of the HPCS Languages: A case study with a quantum chemistry kernel
As high-end computer systems present users with rapidly increasing numbers of processors, possibly also incorporating attached co-processors, programmers are increasingly challeng...
Aniruddha G. Shet, Wael R. Elwasif, Robert J. Harr...