Sciweavers

5608 search results - page 212 / 1122
» On the Theory of Matchgate Computations
Sort
View
DBSEC
2009
163views Database» more  DBSEC 2009»
15 years 3 months ago
A Trust-Based Access Control Model for Pervasive Computing Applications
With the rapid growth in wireless networks and sensor and mobile devices, we are moving towards an era of pervasive computing. Access control is challenging in these environments. ...
Manachai Toahchoodee, Ramadan Abdunabi, Indrakshi ...
CORR
2008
Springer
72views Education» more  CORR 2008»
15 years 2 months ago
Statistical Learning of Arbitrary Computable Classifiers
Statistical learning theory chiefly studies restricted hypothesis classes, particularly those with finite Vapnik-Chervonenkis (VC) dimension. The fundamental quantity of interest i...
David Soloveichik
ICTAC
2009
Springer
15 years 8 months ago
The Secret Art of Computer Programming
“Classical” program development by refinement [12, 2, 3] is a technique for ensuring that source-level program code remains faithful to the semantic goals set out in its corre...
Annabelle McIver
ISSAC
2009
Springer
171views Mathematics» more  ISSAC 2009»
15 years 8 months ago
Computing cylindrical algebraic decomposition via triangular decomposition
Cylindrical algebraic decomposition is one of the most important tools for computing with semi-algebraic sets, while triangular decomposition is among the most important approache...
Changbo Chen, Marc Moreno Maza, Bican Xia, Lu Yang
CCGRID
2008
IEEE
15 years 8 months ago
Overlapping Communication and Computation with High Level Communication Routines
Collective operations and non-blocking point-to-point operations are two important parts of MPI that each provide important performance and programmability benefits. Although non...
Torsten Hoefler, Andrew Lumsdaine