Sciweavers

2558 search results - page 211 / 512
» Model Composition Contracts
Sort
View
IPPS
2010
IEEE
15 years 2 months ago
Parallel external memory graph algorithms
In this paper, we study parallel I/O efficient graph algorithms in the Parallel External Memory (PEM) model, one of the private-cache chip multiprocessor (CMP) models. We study the...
Lars Arge, Michael T. Goodrich, Nodari Sitchinava
286
Voted
AMC
2011
14 years 8 months ago
Ruin theory with excess of loss reinsurance and reinstatements
The present paper studies the probability of ruin of an insurer, if excess of loss reinsurance with reinstatements is applied. In the setting of the classical CramerLundberg risk ...
Hansjörg Albrecher, Sandra Haas
ADBIS
2005
Springer
120views Database» more  ADBIS 2005»
15 years 10 months ago
Extensible Canonical Process Model Synthesis Applying Formal Interpretation
The current period of IT development is characterized by an explosive growth of diverse information representation languages. Applying integration and composition of heterogeneous ...
Leonid A. Kalinichenko, Sergey A. Stupnikov, Nikol...
FC
2009
Springer
150views Cryptology» more  FC 2009»
15 years 11 months ago
Privacy-Preserving Information Markets for Computing Statistical Data
Abstract. Consider an “information market” where private and potentially sensitive data are collected, treated as commodity and processed into aggregated information with comme...
Aggelos Kiayias, Bülent Yener, Moti Yung
131
Voted
CCGRID
2010
IEEE
15 years 6 months ago
A Categorisation of Cloud Computing Business Models
- This paper reviews current cloud computing business models and presents proposals on how organisations can achieve sustainability by adopting appropriate models. We classify clou...
Victor Chang, David A. Bacigalupo, Gary Wills, Dav...