Sciweavers

5344 search results - page 139 / 1069
» Privacy-Preserving Set Operations
Sort
View
ICFEM
2010
Springer
15 years 1 months ago
Laws of Pattern Composition
Design patterns are rarely used on their own. They are almost always to be found composed with each other in real applications. So it is crucial that we can reason about their comp...
Hong Zhu, Ian Bayley
NMR
2004
Springer
15 years 8 months ago
Propositional belief merging and belief negotiation model
We propose in this paper a new family of belief merging operators, that is based on a game between sources : Until a coherent set of sources is reached, at each round a contest is...
Sébastien Konieczny
ICCS
2009
Springer
15 years 7 months ago
Performance Evaluation of Collective Write Algorithms in MPI I/O
MPI is the de-facto standard for message passing in parallel scientific applications. MPI-IO is a part of the MPI-2 specification defining file I/O operations in the MPI world....
Mohamad Chaarawi, Suneet Chandok, Edgar Gabriel
DSN
2004
IEEE
15 years 7 months ago
Assured Reconfiguration of Embedded Real-Time Software
It is often the case that safety-critical systems have to be reconfigured during operation because of issues such as changes in the system's operating environment or the fail...
Elisabeth A. Strunk, John C. Knight
ER
2007
Springer
117views Database» more  ER 2007»
15 years 9 months ago
Semantic Interoperability via Category Theory
This paper aims to bring the benefits of the use of Category Theory to the field of Semantic Web, where the coexistence of intrinsically different models of local knowledge mak...
Isabel Cafezeiro, Edward Hermann Haeusler