Sciweavers

5790 search results - page 252 / 1158
» Distributed programming with distributed authorization
Sort
View
TIT
2011
116views more  TIT 2011»
14 years 10 months ago
Convex Programming Upper Bounds on the Capacity of 2-D Constraints
—The capacity of 1-D constraints is given by the entropy of a corresponding stationary maxentropic Markov chain. Namely, the entropy is maximized over a set of probability distri...
Ido Tal, Ron M. Roth
112
Voted
IPPS
2008
IEEE
15 years 9 months ago
Smart proxies in Java RMI with dynamic aspect-oriented programming
Java RMI extends Java with distributed objects whose methods can be called from remote clients. traction is supported using statically-generated proxy objects on the client to hid...
Andrew Stevenson, Steve MacDonald
COORDINATION
2007
Springer
15 years 9 months ago
A Prolog-Based Language for Workflow Programming
Workflow management systems control activities that are performed in a distributed manner by a number of human or automated participants. There is a wide variety of workflow syste...
Steve Gregory, Martha Paschali
AE
2003
Springer
15 years 8 months ago
A Study of Diversity in Multipopulation Genetic Programming
In this work we study how using multiple communicating populations instead of a single panmictic one may help in maintaining diversity during GP runs. After defining suitable geno...
Marco Tomassini, Leonardo Vanneschi, Francisco Fer...
PPOPP
1995
ACM
15 years 6 months ago
A Model and Compilation Strategy for Out-of-Core Data Parallel Programs
It is widely acknowledged in high-performance computing circles that parallel input/output needs substantial improvement in order to make scalable computers truly usable. We prese...
Rajesh Bordawekar, Alok N. Choudhary, Ken Kennedy,...