Sciweavers

8499 search results - page 65 / 1700
» cans 2009
Sort
View
92
Voted
NCA
2009
IEEE
15 years 7 months ago
Maintaining Network QoS Across NIC Device Driver Failures Using Virtualization
: © Maintaining Network QoS Across NIC Device Driver Failures Using Virtualization Michael Le, Andrew Gallagher, Yuval Tamir, Yoshio Turner HP Laboratories HPL-2009-115 device dri...
Michael Le, Andrew Gallagher, Yuval Tamir, Yoshio ...
189
Voted
POPL
2009
ACM
16 years 1 months ago
Wild control operators
Linguists seek to understand the semantics of expressions in human languages. Taking a computational point of view, there are many natural language expressions--operators in the w...
Chris Barker
GI
2009
Springer
14 years 10 months ago
Visualization of the Influence of SDF on the TMA Solution Space
: In [SH08] we introduced a method for the calculation and visualization of the whole TMA solution space. So, not only the best TMA solution, but also other solution areas with hig...
Ulrich Steimel
113
Voted
CANS
2009
Springer
164views Cryptology» more  CANS 2009»
15 years 7 months ago
Extensions of the Cube Attack Based on Low Degree Annihilators
At Crypto 2008, Shamir introduced a new algebraic attack called the cube attack, which allows us to solve black-box polynomials if we are able to tweak the inputs by varying an ini...
Aileen Zhang, Chu-Wee Lim, Khoongming Khoo, Lei We...
94
Voted
CPAIOR
2009
Springer
15 years 7 months ago
Reformulating Global Grammar Constraints
An attractive mechanism to specify global constraints in rostering and other domains is via formal languages. For instance, the REGULAR and GRAMMAR constraints specify constraints ...
George Katsirelos, Nina Narodytska, Toby Walsh