Sciweavers

2303 search results - page 163 / 461
» Interior-Point Methods in Parallel Computation
Sort
View
148
Voted
PODC
2003
ACM
15 years 8 months ago
Constructing fair-exchange protocols for E-commerce via distributed computation of RSA signatures
Applications such as e-commerce payment protocols, electronic contract signing, and certified e-mail delivery require that fair exchange be assured. A fair-exchange protocol allo...
Jung Min Park, Edwin K. P. Chong, Howard Jay Siege...
124
Voted
PARA
2000
Springer
15 years 7 months ago
Experiments in Separating Computational Algorithm from Program Distribution and Communication
Our proposal has the following key features: 1) The separation of a distributed program into a pure algorithm (PurAl) and a distribution/communication declaration (DUAL). This yie...
Raphael B. Yehezkael, Yair Wiseman, H. G. Mendelba...
117
Voted
SKG
2006
IEEE
15 years 9 months ago
Embedding the Semantic Knowledge in Convolution Kernels
Convolution kernels, such as tree kernel and subsequence kernel are useful for natural language processing tasks. However, most of them ignore the semantic knowledge. In order to ...
Kebin Liu, Fang Li, Ying Han, Lei Liu
115
Voted
NSPW
2006
ACM
15 years 9 months ago
Inconsistency in deception for defense
The use of deception is one of many defensive techniques being explored today. In the past, defenders of systems have used deception haphazardly, but now researchers are developin...
Vicentiu Neagoe, Matt Bishop
111
Voted
CONCUR
1999
Springer
15 years 7 months ago
Testing Concurrent Systems: A Formal Approach
This paper discusses the use of formal methods in testing of concurrent systems. It is argued that formal methods and testing can be mutually profitable and useful. A framework fo...
Jan Tretmans