Sciweavers

669 search results - page 30 / 134
» Mastering the Master Theorem
Sort
View
JPDC
2006
133views more  JPDC 2006»
14 years 11 months ago
Grid computing for parallel bioinspired algorithms
This paper focuses on solving large size combinatorial optimization problems using a Grid-enabled framework called ParadisEO
Nouredine Melab, Sébastien Cahon, El-Ghazal...
CLUSTER
2002
IEEE
14 years 11 months ago
CEJVM: "Cluster Enabled Java Virtual Machine"
CEJVM is a cluster enabled Java Virtual Machine, which executes in a distributed fashion among collaborating nodes of a dedicated cluster. It extends Java`s multithreading mechani...
Muhammad Umar Janjua, Mehboob Yasin, Ch. Falak She...
CP
2010
Springer
14 years 10 months ago
Checking-Up on Branch-and-Check
Abstract. Branch-and-Check, introduced ten years ago, is a generalization of logic-based Benders decomposition. The key extension is to solve the Benders sub-problems at each feasi...
J. Christopher Beck
PODC
2009
ACM
16 years 11 days ago
Vertical paxos and primary-backup replication
We introduce a class of Paxos algorithms called Vertical Paxos, in which reconfiguration can occur in the middle of reaching agreement on an individual state-machine command. Vert...
Leslie Lamport, Dahlia Malkhi, Lidong Zhou
TCC
2009
Springer
114views Cryptology» more  TCC 2009»
16 years 11 days ago
Predicate Privacy in Encryption Systems
Predicate encryption is a new encryption paradigm which gives a master secret key owner fine-grained control over access to encrypted data. The master secret key owner can generat...
Emily Shen, Elaine Shi, Brent Waters