Sciweavers

4757 search results - page 165 / 952
» A Unique
Sort
View
USENIX
2008
15 years 6 months ago
Using Causality to Diagnose Configuration Bugs
We present a novel method for diagnosing configuration management errors. Our proposed approach deduces the state of a buggy computer by running predicates that test system correc...
Mona Attariyan, Jason Flinn
BIOID
2008
103views Biometrics» more  BIOID 2008»
15 years 6 months ago
Identity Management in Face Recognition Systems
Face recognition is one of the most challenging biometric modalities for personal identification. This is due to a number of factors, including the complexity and variability of th...
Massimo Tistarelli, Enrico Grosso
CAV
2008
Springer
152views Hardware» more  CAV 2008»
15 years 6 months ago
Heap Assumptions on Demand
Termination of a heap-manipulating program generally depends on preconditions that express heap assumptions (i.e., assertions describing reachability, aliasing, separation and shar...
Andreas Podelski, Andrey Rybalchenko, Thomas Wies
CIE
2008
Springer
15 years 6 months ago
A Simple P-Matrix Linear Complementarity Problem for Discounted Games
The values of a two-player zero-sum binary discounted game are characterized by a P-matrix linear complementarity problem (LCP). Simple formulas are given to describe the data of t...
Marcin Jurdzinski, Rahul Savani
ECLIPSE
2005
ACM
15 years 6 months ago
Incomplete resolution of references in Eclipse
In the Eclipse JDT, the Java reference resolution rules are applied as fully as possible, thereby either determining the unique target for a given reference or signalling that the...
Joseph J. C. Chang, Robert J. Walker