Sciweavers

3367 search results - page 364 / 674
» Incremental assignment problem
Sort
View
APSEC
2005
IEEE
15 years 10 months ago
Simulation-based Validation and Defect Localization for Evolving, Semi-Formal Requirements Models
When requirements models are developed in an iterative and evolutionary way, requirements validation becomes a major problem. In order to detect and fix problems early, the speci...
Christian Seybold, Silvio Meier
144
Voted
ICRA
2005
IEEE
135views Robotics» more  ICRA 2005»
15 years 10 months ago
Sampling-Based Motion Planning Using Predictive Models
— Robotic motion planning requires configuration space exploration. In high-dimensional configuration spaces, a complete exploration is computationally intractable. Practical m...
Brendan Burns, Oliver Brock
155
Voted
IEEESCC
2005
IEEE
15 years 10 months ago
Satisfying Database Service Level Agreements while Minimizing Cost through Storage QoS
The emerging paradigms of service oriented architectures and utility-based computing have the potential to greatly reduce the cost of data management. Data management service prov...
Frederick Reiss, Tapas Kanungo
132
Voted
PODC
2005
ACM
15 years 10 months ago
Advanced contention management for dynamic software transactional memory
The obstruction-free Dynamic Software Transactional Memory (DSTM) system of Herlihy et al. allows only one transaction at a time to acquire an object for writing. Should a second ...
William N. Scherer III, Michael L. Scott
ACNS
2005
Springer
183views Cryptology» more  ACNS 2005»
15 years 10 months ago
Privacy Preserving Keyword Searches on Remote Encrypted Data
We consider the following problem: a user U wants to store his files in an encrypted form on a remote file server S. Later the user U wants to efficiently retrieve some of the en...
Yan-Cheng Chang, Michael Mitzenmacher