Sciweavers

2438 search results - page 333 / 488
» Consistent Gradient Operators
Sort
View
SC
2005
ACM
15 years 3 months ago
Performance-constrained Distributed DVS Scheduling for Scientific Applications on Power-aware Clusters
Left unchecked, the fundamental drive to increase peak performance using tens of thousands of power hungry components will lead to intolerable operating costs and failure rates. H...
Rong Ge, Xizhou Feng, Kirk W. Cameron
SIGUCCS
2005
ACM
15 years 3 months ago
Universal imaging: revolutionizing desktop support
Lehigh University has recently implemented a new PC deployment model which is built around the Universal Imaging Utility, a product of Big Bang, LLC. This model has allowed Lehigh...
Stephen G. Lewis, Sara K. Rodgers
ACNS
2005
Springer
113views Cryptology» more  ACNS 2005»
15 years 3 months ago
A Traitor Tracing Scheme Based on RSA for Fast Decryption
Abstract. We describe a fully k-resilient traitor tracing scheme that utilizes RSA as a secret-key rather than public-key cryptosystem. Traitor tracing schemes deter piracy in broa...
John Patrick McGregor, Yiqun Lisa Yin, Ruby B. Lee
FC
2005
Springer
120views Cryptology» more  FC 2005»
15 years 3 months ago
Achieving Fairness in Private Contract Negotiation
Abstract. Suppose Alice and Bob are two entities (e.g. agents, organizations, etc.) that wish to negotiate a contract. A contract consists of several clauses, and each party has ce...
Keith B. Frikken, Mikhail J. Atallah
GECCO
2005
Springer
122views Optimization» more  GECCO 2005»
15 years 3 months ago
An enhanced GA to improve the search process reliability in tuning of control systems
Evolutionary Algorithms (EAs) have been largely applied to optimisation and synthesis of controllers. In spite of several successful applications and competitive solutions, the st...
Andrea Soltoggio