Sciweavers

17366 search results - page 140 / 3474
» New Revision Algorithms
Sort
View
KR
2004
Springer
15 years 9 months ago
Reaching Agreement Through Argumentation: A Possibilistic Approach
Negotiation plays a key role as a means for sharing information and resources with the aim of looking for a common agreement. This paper proposes a new approach based on possibili...
Leila Amgoud, Henri Prade
EUROCRYPT
2003
Springer
15 years 9 months ago
Cryptanalysis of the Public-Key Encryption Based on Braid Groups
At CRYPTO 2000, a new public-key encryption based on braid groups was introduced. This paper demonstrates how to solve its underlying problem using the Burau representation. By thi...
Eonkyung Lee, Je Hong Park
ICSR
2009
Springer
15 years 8 months ago
Consistency Checking for Component Reuse in Open Systems
Large scale Open Systems are built from reusable components in such a way that enhanced system functionality can be deployed, quickly and effectively, simply by plugging in a few n...
Peter Henderson, Matthew J. Henderson
ICCAD
2000
IEEE
149views Hardware» more  ICCAD 2000»
15 years 8 months ago
Dynamic Response Time Optimization for SDF Graphs
Synchronous Data Flow (SDF) is a well-known model of computation that is widely used in the control engineering and digital signal processing domains. Existing scheduling methods ...
Dirk Ziegenbein, Jan Uerpmann, Ralph Ernst
126
Voted
ICDE
2000
IEEE
82views Database» more  ICDE 2000»
15 years 7 months ago
Generalized Isolation Level Definitions
Commercial databases support different isolation levels to allow programmers to trade off consistency for a potential gain in performance. The isolation levels are defined in the ...
Atul Adya, Barbara Liskov, Patrick E. O'Neil