Sciweavers

1653 search results - page 180 / 331
» Directed tree-width examples
Sort
View
FASE
2005
Springer
15 years 8 months ago
Analyzing Web Service Based Business Processes
This paper is concerned with the application of Web services to distributed, cross-organizational business processes. In this scenario, it is crucial to answer the following questi...
Axel Martens
128
Voted
HYBRID
2005
Springer
15 years 8 months ago
Adjoint-Based Optimal Control of the Expected Exit Time for Stochastic Hybrid Systems
Abstract. In this paper, we study the problem of controlling the expected exit time from a region for a class of stochastic hybrid systems. That is, we find the least costly feedb...
Robin L. Raffard, Jianghai Hu, Claire Tomlin
ICCS
2005
Springer
15 years 8 months ago
Collecting and Exploiting Cache-Reuse Metrics
Abstract. The increasing gap of processor and main memory performance underlines the need for cache-optimizations, especially on memoryintensive applications. Tools which are able ...
Josef Weidendorfer, Carsten Trinitis
LOCA
2005
Springer
15 years 8 months ago
Mobile Context Inference Using Low-Cost Sensors
In this paper, we introduce a compact system for fusing location data with data from simple, low-cost, non-location sensors to infer a user’s place and situational context. Speci...
Evan Welbourne, Jonathan Lester, Anthony LaMarca, ...
142
Voted
TCC
2005
Springer
176views Cryptology» more  TCC 2005»
15 years 8 months ago
How to Securely Outsource Cryptographic Computations
We address the problem of using untrusted (potentially malicious) cryptographic helpers. We provide a formal security definition for securely outsourcing computations from a comp...
Susan Hohenberger, Anna Lysyanskaya