Sciweavers

430 search results - page 48 / 86
» Efficient Proving for Practical Distributed Access-Control S...
Sort
View
PIMRC
2008
IEEE
15 years 6 months ago
The limits of theory: Pragmatic challenges in mobile ad hoc systems
—The development of mobile ad hoc systems have considerably emphasized the need for a better understanding of the factors that influence the systems’ performance, i.e., mobili...
Franck Legendre, Martin May, Vincent Lenders, Gunn...
CISC
2008
Springer
117views Cryptology» more  CISC 2008»
15 years 1 months ago
Strong Anonymous Signatures
The notion of anonymous signatures has recently been formalized by [18], which captures an interesting property that a digital signature can sometimes hide the identity of the sign...
Rui Zhang 0002, Hideki Imai
ICANNGA
2007
Springer
134views Algorithms» more  ICANNGA 2007»
15 years 1 months ago
Optical Design with Epsilon-Dominated Multi-objective Evolutionary Algorithm
Significant improvement over a patented lens design is achieved using multi-objective evolutionary optimization. A comparison of the results obtained from NSGA2 and ε-MOEA is done...
Shaine Joseph, Hyung W. Kang, Uday K. Chakraborty
DSE
1998
80views more  DSE 1998»
14 years 11 months ago
The Voltan application programming environment for fail-silent processes
The Voltan software library for building distributed applications provides the support for (i) a processpair to act as single Voltan self-checking ‘fail-silent’ process; and (...
Dave Black, C. Low, Santosh K. Shrivastava
CLUSTER
2009
IEEE
15 years 3 months ago
Analytical modeling and optimization for affinity based thread scheduling on multicore systems
Abstract--This paper proposes an analytical model to estimate the cost of running an affinity-based thread schedule on multicore systems. The model consists of three submodels to e...
Fengguang Song, Shirley Moore, Jack Dongarra