Sciweavers

78 search results - page 9 / 16
» One parser to rule them all
Sort
View
85
Voted
CISC
2005
Springer
109views Cryptology» more  CISC 2005»
15 years 4 months ago
Enforcing Email Addresses Privacy Using Tokens
We propose a system which allows users to monitor how their email addresses are used and how they spread over the Internet. This protects the privacy of the user and can reduce the...
Roman Schlegel, Serge Vaudenay
86
Voted
MTA
2007
141views more  MTA 2007»
14 years 10 months ago
Flexible integration of multimedia sub-queries with qualitative preferences
Complex multimedia queries, aiming to retrieve from large databases those objects that best match the query specification, are usually processed by splitting them into a set of m ...
Ilaria Bartolini, Paolo Ciaccia, Vincent Oria, M. ...
FUN
2010
Springer
230views Algorithms» more  FUN 2010»
15 years 2 months ago
Scheduling with Bully Selfish Jobs
In job scheduling with precedence constraints, i j means that job j cannot start being processed before job i is completed. In this paper we consider selfish bully jobs who do no...
Tami Tamir
82
Voted
ICS
2010
Tsinghua U.
15 years 8 months ago
A New Look at Selfish Routing
: We revisit price of anarchy in network routing, in a new model in which routing decisions are made by self-interested components of the network, as opposed to by the flows as in ...
Christos Papadimitriou, Gregory Valiant
MODELS
2009
Springer
15 years 5 months ago
Towards systematic ensuring well-formedness of software product lines
Variability modelling with feature models is one key technique for specifying the problem space of software product lines (SPLs). To allow for the automatic derivation of a concre...
Florian Heidenreich