Sciweavers

3113 search results - page 237 / 623
» Efficiently Generating Efficient Generating Extensions in Pr...
Sort
View
AMAI
1999
Springer
15 years 4 months ago
Logic Programs with Stable Model Semantics as a Constraint Programming Paradigm
Logic programming with the stable model semantics is put forward as a novel constraint programming paradigm. This paradigm is interesting because it bring advantages of logic prog...
Ilkka Niemelä
TON
2010
204views more  TON 2010»
14 years 11 months ago
Passive Diagnosis for Wireless Sensor Networks
Network diagnosis, an essential research topic for traditional networking systems, has not received much attention for wireless sensor networks. Existing sensor debugging tools li...
Yunhao Liu, Kebin Liu, Mo Li
PKC
2009
Springer
131views Cryptology» more  PKC 2009»
16 years 5 months ago
Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys
At Crypto'07, Goyal introduced the concept of Accountable Authority Identity-Based Encryption as a convenient tool to reduce the amount of trust in authorities in Identity-Bas...
Benoît Libert, Damien Vergnaud
VLDB
2007
ACM
102views Database» more  VLDB 2007»
16 years 5 months ago
Randomized Algorithms for Data Reconciliation in Wide Area Aggregate Query Processing
Many aspects of the data integration problem have been considered in the literature: how to match schemas across different data sources, how to decide when different records refer...
Fei Xu, Chris Jermaine
171
Voted
CCGRID
2004
IEEE
15 years 8 months ago
Search performance analysis and robust search algorithm in unstructured peer-to-peer networks
Recently Peer-to-Peer networks (P2P) have gained great attention and popularity. One key challenging aspect in a P2P resource sharing environment is an efficient searching algorit...
Tsungnan Lin, Hsinping Wang, Jianming Wang