Sciweavers

635 search results - page 65 / 127
» Some Computational Problems Related to Pseudo-intents
Sort
View
IDTRUST
2010
ACM
15 years 4 months ago
Practical and secure trust anchor management and usage
Public Key Infrastructure (PKI) security depends upon secure management and usage of trust anchors. Unfortunately, widely used mechanisms, management models and usage practices re...
Carl Wallace, Geoff Beier
IEEEICCI
2006
IEEE
15 years 3 months ago
Rough Set Method Based on Multi-Granulations
The original rough set model is concerned primarily with the approximation of sets described by single binary relation on universe. In the view of granular computing, classical ro...
Y. H. Qian, J. Y. Liang
PATAT
2004
Springer
135views Education» more  PATAT 2004»
15 years 3 months ago
A Column Generation Scheme for Faculty Timetabling
In this paper we deal with the problem of building a timetable for the courses of a university faculty. We propose an integer linear programming approach based on column generation...
Andrea Qualizza, Paolo Serafini
GCC
2003
Springer
15 years 3 months ago
A Novel Approach to Semantics-Based Exception Handling for Service Grid Applications
Whenever the characteristics of a service grid environment are addressed, issues related to openness and dynamism pop out first. Such issues do affect the definition and handling o...
Donglai Li, Yanbo Han, Haitao Hu, Jun Fang, Xue Wa...
ISW
2001
Springer
15 years 2 months ago
An Auditable Metering Scheme for Web Advertisement Applications
This paper proposes a cryptographic mechanism for metering the duration and/or the number of instances of running a data process. This mechanism has the following property: knowing...
Liqun Chen, Wenbo Mao