滑动 发表于 2025-3-26 21:37:48

http://reply.papertrans.cn/24/2331/233053/233053_31.png

Type-1-Diabetes 发表于 2025-3-27 01:08:26

Improvements to the Helpful-Set Algorithm and a New Evaluation Scheme for Graph-Partitionersgorithm and a local refinement heuristic has proven to be a powerful method, and several libraries exist providing such an implementation. Due to the large involvement of heuristics, the evaluation of these libraries is usually based on experiments. In this paper we show that single experiments are

Catheter 发表于 2025-3-27 09:08:47

Mesh Partitioners for Computational Grids: A Comparisonbuted, mesh-based applications may require a mesh partitioner that considers both processor and network heterogeneity. We have developed a heterogeneous mesh partitioner, called PaGrid. PaGrid uses a multilevel graph partitioning approach, augmented by execution time load balancing in the final unco

Gourmet 发表于 2025-3-27 12:43:50

CONFIIT: A Middleware for Peer to Peer Computing peer-to-peer environment designed to compute FIIT problems. This Java written middleware aims at setting a logical ring organization for network’s resources, such as PCs, workstations or parallel architectures. It also offers a low-cost communication solution to share, and compute, the different ta

Initiative 发表于 2025-3-27 15:39:12

http://reply.papertrans.cn/24/2331/233053/233053_35.png

Axon895 发表于 2025-3-27 21:46:36

http://reply.papertrans.cn/24/2331/233053/233053_36.png

Venules 发表于 2025-3-27 22:30:42

A Modular Architecture for Distributed IDS in MANETnvironment. The main feature of our proposition relies on the use, on each node of the MANET, of a local IDS (LIDS) cooperating with other LIDSes through the use of mobile agents. The modular design is needed as a response to the extensibility requirements related to the complex contexts of MANET. T

otic-capsule 发表于 2025-3-28 03:54:51

Characterization of the Security Implications of Alternative E-procurement Topologiestions. In order to establish these alternative topologies we consider how the two main participants (buyer and supplier) could access to the e-procurement solution (i.e. through the Internet or through a Virtual Private Network — VPN-). From the point of view of the buyer, we consider two main possi

卡死偷电 发表于 2025-3-28 09:36:59

http://reply.papertrans.cn/24/2331/233053/233053_39.png

跑过 发表于 2025-3-28 14:07:45

On the Number of Equivalence Classes in Certain Stream Ciphersrepresentation. The aim is to get some knowledge about the different nonlinear filter equivalence classes, where these filters are partitioned according to cyclic shift and conjugacy. This equivalence also indicates an identical linear complexity for all sequences in the same equivalence class. The
页: 1 2 3 [4] 5 6
查看完整版本: Titlebook: Computational Science and Its Applications - ICCSA 2003; International Confer Vipin Kumar,Marina L. Gavrilova,Pierre L’Ecuyer Conference pr