用户名  找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Computational Science and Its Applications - ICCSA 2003; International Confer Vipin Kumar,Marina L. Gavrilova,Pierre L’Ecuyer Conference pr

[复制链接]
楼主: interleukins
发表于 2025-3-26 21:37:48 | 显示全部楼层
发表于 2025-3-27 01:08:26 | 显示全部楼层
Improvements to the Helpful-Set Algorithm and a New Evaluation Scheme for Graph-Partitionersgorithm and a local refinement heuristic has proven to be a powerful method, and several libraries exist providing such an implementation. Due to the large involvement of heuristics, the evaluation of these libraries is usually based on experiments. In this paper we show that single experiments are
发表于 2025-3-27 09:08:47 | 显示全部楼层
Mesh Partitioners for Computational Grids: A Comparisonbuted, mesh-based applications may require a mesh partitioner that considers both processor and network heterogeneity. We have developed a heterogeneous mesh partitioner, called PaGrid. PaGrid uses a multilevel graph partitioning approach, augmented by execution time load balancing in the final unco
发表于 2025-3-27 12:43:50 | 显示全部楼层
CONFIIT: A Middleware for Peer to Peer Computing peer-to-peer environment designed to compute FIIT problems. This Java written middleware aims at setting a logical ring organization for network’s resources, such as PCs, workstations or parallel architectures. It also offers a low-cost communication solution to share, and compute, the different ta
发表于 2025-3-27 15:39:12 | 显示全部楼层
发表于 2025-3-27 21:46:36 | 显示全部楼层
发表于 2025-3-27 22:30:42 | 显示全部楼层
A Modular Architecture for Distributed IDS in MANETnvironment. The main feature of our proposition relies on the use, on each node of the MANET, of a local IDS (LIDS) cooperating with other LIDSes through the use of mobile agents. The modular design is needed as a response to the extensibility requirements related to the complex contexts of MANET. T
发表于 2025-3-28 03:54:51 | 显示全部楼层
Characterization of the Security Implications of Alternative E-procurement Topologiestions. In order to establish these alternative topologies we consider how the two main participants (buyer and supplier) could access to the e-procurement solution (i.e. through the Internet or through a Virtual Private Network — VPN-). From the point of view of the buyer, we consider two main possi
发表于 2025-3-28 09:36:59 | 显示全部楼层
发表于 2025-3-28 14:07:45 | 显示全部楼层
On the Number of Equivalence Classes in Certain Stream Ciphersrepresentation. The aim is to get some knowledge about the different nonlinear filter equivalence classes, where these filters are partitioned according to cyclic shift and conjugacy. This equivalence also indicates an identical linear complexity for all sequences in the same equivalence class. The
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 吾爱论文网 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
QQ|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-7-20 19:05
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表