Sciweavers

1917 search results - page 75 / 384
» User Model and Utility Based Power Management
Sort
View
ICPADS
2008
IEEE
15 years 8 months ago
A Meta-scheduler with Auction Based Resource Allocation for Global Grids
As users increasingly require better quality of service from Grids, resource management and scheduling mechanisms have to evolve in order to satisfy competing demands on limited r...
Saurabh Kumar Garg, Srikumar Venugopal, Rajkumar B...
EUROCRYPT
2007
Springer
15 years 7 months ago
The Power of Proofs-of-Possession: Securing Multiparty Signatures against Rogue-Key Attacks
Abstract. Multiparty signature protocols need protection against roguekey attacks, made possible whenever an adversary can choose its public key(s) arbitrarily. For many schemes, p...
Thomas Ristenpart, Scott Yilek
CP
2004
Springer
15 years 7 months ago
Leveraging the Learning Power of Examples in Automated Constraint Acquisition
Constraint programming is rapidly becoming the technology of choice for modeling and solving complex combinatorial problems. However, users of constraint programming technology nee...
Christian Bessière, Remi Coletta, Eugene C....
SIGMOD
2010
ACM
239views Database» more  SIGMOD 2010»
15 years 1 months ago
Call to order: a hierarchical browsing approach to eliciting users' preference
Computing preference queries has received a lot of attention in the database community. It is common that the user is unsure of his/her preference, so care must be taken to elicit...
Feng Zhao, Gautam Das, Kian-Lee Tan, Anthony K. H....
ESWS
2011
Springer
14 years 5 months ago
miKrow: Semantic Intra-enterprise Micro-Knowledge Management System
Abstract. Knowledge Management systems are one of the key strategies that allow companies to fully tap into their collective knowledge. However, two main entry barriers currently l...
Víctor Penela, Guillermo Álvaro, Car...