Sciweavers

940 search results - page 113 / 188
» New Cryptanalytic Results on IDEA
Sort
View
WEBI
2009
Springer
15 years 6 months ago
Rigorous Probabilistic Trust-Inference with Applications to Clustering
The World Wide Web has transformed into an environment where users both produce and consume information. In order to judge the validity of information, it is important to know how...
Thomas DuBois, Jennifer Golbeck, Aravind Srinivasa...
CPAIOR
2009
Springer
15 years 6 months ago
A Shortest Path-Based Approach to the Multileaf Collimator Sequencing Problem
Abstract. The multileaf collimator sequencing problem is an important component in effective cancer treatment delivery. The problem can be formulated as finding a decomposition of...
Hadrien Cambazard, Eoin O'Mahony, Barry O'Sullivan
GECCO
2009
Springer
143views Optimization» more  GECCO 2009»
15 years 6 months ago
Exploiting hierarchical clustering for finding bounded diameter minimum spanning trees on euclidean instances
The bounded diameter minimum spanning tree problem is an NP-hard combinatorial optimization problem arising, for example, in network design when quality of service is of concern. ...
Martin Gruber, Günther R. Raidl
MDM
2009
Springer
121views Communications» more  MDM 2009»
15 years 6 months ago
Lazy-Update B+-Tree for Flash Devices
— With the rapid increasing capacity of flash chips, flash-aware indexing techniques are highly desirable for flash devices. The unique features of flash memory, such as the ...
Sai Tung On, Haibo Hu, Yu Li, Jianliang Xu
REFSQ
2009
Springer
15 years 6 months ago
Composing Models for Detecting Inconsistencies: A Requirements Engineering Perspective
Abstract. [Context and motivation] Ever-growing systems’ complexity and novel requirements engineering approaches such as reuse or globalization imply that requirements are produ...
Gilles Perrouin, Erwan Brottier, Benoit Baudry, Yv...