Sciweavers

368 search results - page 42 / 74
» System BV is NP-complete
Sort
View
INFSOF
2006
117views more  INFSOF 2006»
14 years 9 months ago
A high concurrency XPath-based locking protocol for XML databases
Providing efficient access to XML documents becomes crucial in XML database systems. More and more concurrency control protocols for XML database systems were proposed in the past...
Kuen-Fang Jack Jea, Shih-Ying Chen
CPHYSICS
2007
100views more  CPHYSICS 2007»
14 years 9 months ago
Dielectric anisotropy in the GW space-time method
Excited-state calculations, notably for quasiparticle band structures, are nowadays routinely performed within the GW approximation for the electronic self-energy. Nevertheless, c...
Christoph Freysoldt, Philipp Eggert, Patrick Rinke...
DSS
2007
79views more  DSS 2007»
14 years 9 months ago
Leveraging Question Answer technology to address terrorism inquiry
This paper investigates the potential use of dialog-based ALICEbots in disseminating terrorism information to the general public. In particular, we study the acceptance and respon...
Robert P. Schumaker, Hsinchun Chen
ECRA
2007
73views more  ECRA 2007»
14 years 9 months ago
An innovative revocation scheme for one-to-many E-services
E-service providers usually encrypt each E-service message to prevent unauthorized receivers from reading the content and they change the encryption keys periodically for security...
Ren-Hung Lin, Jinn-ke Jan
PE
2008
Springer
109views Optimization» more  PE 2008»
14 years 9 months ago
A conditional probability approach to M/G/1-like queues
Following up on a recently renewed interest in computational methods for M/G/1-type processes, this paper considers an M/G/1-like system in which the service time distribution is ...
Alexandre Brandwajn, Hongyun Wang