Sciweavers

1677 search results - page 243 / 336
» On the Completeness of Quantum Computation Models
Sort
View
ICALP
2005
Springer
15 years 7 months ago
Basing Cryptographic Protocols on Tamper-Evident Seals
Abstract. In this paper we attempt to formally study two very intuitive physical models: sealed envelopes and locked boxes, often used as illustrations for common cryptographic ope...
Tal Moran, Moni Naor
ICALP
2004
Springer
15 years 7 months ago
Online Scheduling of Equal-Length Jobs: Randomization and Restarts Help
We consider the following scheduling problem. The input is a set of jobs with equal processing times, where each job is specified by its release time and deadline. The goal is to ...
Marek Chrobak, Wojciech Jawor, Jiri Sgall, Tom&aac...
POLICY
2004
Springer
15 years 7 months ago
Policy Based Management for Internet Communities
Policy Based Management (PBM) is a research topic that has been driven by the tremendous complexity inherent in the administration and management of present-day networking and tel...
Kevin Chekov Feeney, David Lewis, Vincent P. Wade
HICSS
2003
IEEE
198views Biometrics» more  HICSS 2003»
15 years 6 months ago
Allocating Time and Resources in Project Management Under Uncertainty
We define and develop a solution approach for planning, scheduling and managing project efforts where there is significant uncertainty in the duration, resource requirements and o...
Mark A. Turnquist, Linda K. Nozick
RTCSA
2003
IEEE
15 years 6 months ago
XRTJ: An Extensible Distributed High-Integrity Real-Time Java Environment
Despite Java’s initial promise of providing a reliable and cost-effective platform-independent environment, the language appears to be unfavourable in the area of high-integrity...
Erik Yu-Shing Hu, Andy J. Wellings, Guillem Bernat