Sciweavers

1855 search results - page 128 / 371
» System Consequence
Sort
View
117
Voted
IPPS
1998
IEEE
15 years 8 months ago
An Evolutionary Approach to Multiprocessor Scheduling of Dependent Tasks
The scheduling of application tasks is a problem that occurs in all multiprocessor systems. This problem becomes even more complicated if the tasks are not independent but are inte...
Roman Nossal
ISSAC
1989
Springer
74views Mathematics» more  ISSAC 1989»
15 years 7 months ago
Lookup Tables, Recurrences and Complexity
The use of lookup tables can reduce the complexity of calculation of functions defined typically by mathematical recurrence relations. Although this technique has been adopted by...
Richard J. Fateman
104
Voted
CCS
2007
ACM
15 years 7 months ago
Efficient techniques for realizing geo-spatial access control
The problem of key management for access control systems has been well-studied, and the literature contains several schemes for hierarchy-based and temporal-based access control. ...
Mikhail J. Atallah, Marina Blanton, Keith B. Frikk...
146
Voted
ECSA
2007
Springer
15 years 7 months ago
Leveraging Architecture Patterns to Satisfy Quality Attributes
Architectural design has been characterized as making a series of decisions that have system-wide impact. These decisions have side effects which can have significant impact on the...
Neil B. Harrison, Paris Avgeriou
CCS
2004
ACM
15 years 7 months ago
Group signatures with verifier-local revocation
Group signatures have recently become important for enabling privacy-preserving attestation in projects such as Microsoft's ngscb effort (formerly Palladium). Revocation is c...
Dan Boneh, Hovav Shacham