Sciweavers

949 search results - page 128 / 190
» Theory of Constraints
Sort
View
121
Voted
SPAA
2003
ACM
15 years 5 months ago
The effect of communication costs in solid-state quantum computing architectures
Quantum computation has become an intriguing technology with which to attack difficult problems and to enhance system security. Quantum algorithms, however, have been analyzed un...
Dean Copsey, Mark Oskin, Tzvetan S. Metodi, Freder...
ESORICS
2007
Springer
15 years 4 months ago
Satisfiability and Resiliency in Workflow Systems
We propose the role-and-relation-based access control (R2 BAC) model for workflow systems. In R2 BAC, in addition to a user's role memberships, the user's relationships w...
Qihua Wang, Ninghui Li
ATAL
2010
Springer
15 years 1 months ago
Opportunistic belief reconciliation during distributed interactions
Successful interaction between autonomous agents is contingent on those agents making decisions consistent with the expectations of their peers -- these expectations are based on ...
Paul Martin, David Robertson, Michael Rovatsos
JAR
2006
236views more  JAR 2006»
15 years 17 days ago
Deciding Boolean Algebra with Presburger Arithmetic
We describe an algorithm for deciding the first-order multisorted theory BAPA, which combines 1) Boolean algebras of sets of uninterpreted elements (BA) and 2) Presburger arithmeti...
Viktor Kuncak, Huu Hai Nguyen, Martin C. Rinard
JSAC
2007
140views more  JSAC 2007»
15 years 14 days ago
Cross-layer resource allocation over wireless relay networks for quality of service provisioning
— We propose a physical-datalink cross-layer resource allocation scheme over wireless relay networks for quality-ofservice (QoS) guarantees. By integrating information theory wit...
Jia Tang, Xi Zhang