Sciweavers

1354 search results - page 83 / 271
» Generalized real analysis and its applications
Sort
View
119
Voted
JCS
2010
80views more  JCS 2010»
14 years 7 months ago
Constraint differentiation: Search-space reduction for the constraint-based analysis of security protocols
We introduce constraint differentiation, a powerful technique for reducing search when model-checking security protocols using constraint-based methods. Constraint differentiation...
Sebastian Mödersheim, Luca Viganò, Dav...
AIPS
2006
15 years 2 months ago
Lessons Learned in Applying Domain-Independent Planning to High-Speed Manufacturing
Much has been made of the need for academic planning research to orient towards real-world applications. In this paper, we relate our experience in adapting domain-independent pla...
Minh Binh Do, Wheeler Ruml
GROUP
2003
ACM
15 years 6 months ago
Concepts for usable patterns of groupware applications
Patterns, which are based on in-depth practical experience, can be instructing for the design of groupware applications as sociotechnical systems. On the basis of a summary of the...
Thomas Herrmann, Marcel Hoffmann, Isa Jahnke, Andr...
CLUSTER
2009
IEEE
14 years 10 months ago
Coordinating the use of GPU and CPU for improving performance of compute intensive applications
GPUs have recently evolved into very fast parallel co-processors capable of executing general purpose computations extremely efficiently. At the same time, multi-core CPUs evolutio...
George Teodoro, Rafael Sachetto Oliveira, Olcay Se...
127
Voted
ESA
2004
Springer
126views Algorithms» more  ESA 2004»
15 years 6 months ago
Path Decomposition Under a New Cost Measure with Applications to Optical Network Design
We introduce a problem directly inspired by its application to DWDM (dense wavelength division multiplexing) network design. We are given a set of demands to be carried over a netw...
Elliot Anshelevich, Lisa Zhang