Sciweavers

1653 search results - page 180 / 331
» Directed tree-width examples
Sort
View
FASE
2005
Springer
15 years 10 months ago
Analyzing Web Service Based Business Processes
This paper is concerned with the application of Web services to distributed, cross-organizational business processes. In this scenario, it is crucial to answer the following questi...
Axel Martens
HYBRID
2005
Springer
15 years 10 months ago
Adjoint-Based Optimal Control of the Expected Exit Time for Stochastic Hybrid Systems
Abstract. In this paper, we study the problem of controlling the expected exit time from a region for a class of stochastic hybrid systems. That is, we find the least costly feedb...
Robin L. Raffard, Jianghai Hu, Claire Tomlin
ICCS
2005
Springer
15 years 10 months ago
Collecting and Exploiting Cache-Reuse Metrics
Abstract. The increasing gap of processor and main memory performance underlines the need for cache-optimizations, especially on memoryintensive applications. Tools which are able ...
Josef Weidendorfer, Carsten Trinitis
LOCA
2005
Springer
15 years 10 months ago
Mobile Context Inference Using Low-Cost Sensors
In this paper, we introduce a compact system for fusing location data with data from simple, low-cost, non-location sensors to infer a user’s place and situational context. Speci...
Evan Welbourne, Jonathan Lester, Anthony LaMarca, ...
TCC
2005
Springer
176views Cryptology» more  TCC 2005»
15 years 10 months ago
How to Securely Outsource Cryptographic Computations
We address the problem of using untrusted (potentially malicious) cryptographic helpers. We provide a formal security definition for securely outsourcing computations from a comp...
Susan Hohenberger, Anna Lysyanskaya