Sciweavers

5790 search results - page 857 / 1158
» Distributed programming with distributed authorization
Sort
View
114
Voted
PARBASE
1990
69views more  PARBASE 1990»
15 years 3 months ago
A Vectorization Technique of Hashing and Its Application to Several Sorting Algorithms
This paper presents a vectorized algorithm for entering data into a hash table. A program that enters multiple data could not be executed on vector processors by conventional vect...
Yasusi Kanada
138
Voted
CADE
2010
Springer
15 years 3 months ago
MCMT: A Model Checker Modulo Theories
Abstract. We describe mcmt, a fully declarative and deductive symbolic model checker for safety properties of infinite state systems whose state variables are arrays. Theories spec...
Silvio Ghilardi, Silvio Ranise
118
Voted
ECAI
2010
Springer
15 years 3 months ago
LP Solvable Models for Multiagent Fair Allocation Problems
This paper proposes several operational approaches for solving fair allocation problems in the context of multiagent optimization. These problems arise in various contexts such as ...
Julien Lesca, Patrice Perny
118
Voted
ICASSP
2010
IEEE
15 years 2 months ago
Clustering disjoint subspaces via sparse representation
Given a set of data points drawn from multiple low-dimensional linear subspaces of a high-dimensional space, we consider the problem of clustering these points according to the su...
Ehsan Elhamifar, René Vidal
131
Voted
GLOBECOM
2008
IEEE
15 years 2 months ago
Maximum-Lifetime Coding Subgraph for Multicast Traffic in Wireless Sensor Networks
It has been shown that network coding can lead to significant improvement in network capacity and reduction in power consumption for multicast traffic in wireless networks. In this...
Vahid Shah-Mansouri, Vincent W. S. Wong