Sciweavers

5344 search results - page 161 / 1069
» Privacy-Preserving Set Operations
Sort
View
ISCAS
1999
IEEE
113views Hardware» more  ISCAS 1999»
15 years 7 months ago
Energy efficient software through dynamic voltage scheduling
The energy usage of computer systems is becoming important, especially for portablebattery-operated applications and embedded systems. A significant reduction in the energy consum...
Gangadhar Konduri, James Goodman, Anantha Chandrak...
124
Voted
COSIT
1997
Springer
102views GIS» more  COSIT 1997»
15 years 7 months ago
Partition and Conquer
Abstract. Although maps and partitions are ubiquitous in geographical information systems and spatial databases, there is only little work investigating their foundations. We give ...
Martin Erwig, Markus Schneider
CSCW
1996
ACM
15 years 7 months ago
An Integrating, Transformation-Oriented Approach to Concurrency Control and Undo in Group Editors
Concurrency control and group undo are important issues in the design of groupware, especially for interactive group editors. We present an improved versionofanexistingdistributed...
Matthias Ressel, Doris Nitsche-Ruhland, Rul Gunzen...
FOSSACS
2006
Springer
15 years 7 months ago
Denotational Semantics of Hybrid Automata
Abstract. We introduce a denotational semantics for non-linear hybrid automata, and relate it to the operational semantics given in terms of hybrid trajectories. The semantics is d...
Abbas Edalat, Dirk Pattinson
GECCO
2006
Springer
137views Optimization» more  GECCO 2006»
15 years 7 months ago
Inside a predator-prey model for multi-objective optimization: a second study
In this article, new variation operators for evolutionary multiobjective algorithms (EMOA) are proposed. On the basis of a predator-prey model theoretical considerations as well a...
Christian Grimme, Karlheinz Schmitt