Sciweavers

761 search results - page 102 / 153
» Concise and Consistent Naming
Sort
View
IJHPCA
2007
88views more  IJHPCA 2007»
13 years 9 months ago
A Portable Method for Finding User Errors in the Usage of MPI Collective Operations
An MPI profiling library is a standard mechanism for intercepting MPI calls by applications. Profiling libraries are so named because they are commonly used to gather runtime in...
Christopher Falzone, Anthony Chan, Ewing L. Lusk, ...
TFS
2008
90views more  TFS 2008»
13 years 8 months ago
Fuzzy Interpolation and Extrapolation: A Practical Approach
Fuzzy interpolation does not only help to reduce the complexity of fuzzy models, but also makes inference in sparse rule-based systems possible. It has been successfully applied to...
Zhiheng Huang, Qiang Shen
TIFS
2008
179views more  TIFS 2008»
13 years 8 months ago
Blind Identification of Source Cell-Phone Model
The various image-processing stages in a digital camera pipeline leave telltale footprints, which can be exploited as forensic signatures. These footprints consist of pixel defects...
Oya Çeliktutan, Bülent Sankur, Ismail ...
TON
2008
149views more  TON 2008»
13 years 8 months ago
Building heterogeneous peer-to-peer networks: protocol and analysis
In this paper, we propose a simple protocol for building heterogeneous unstructured peer-to-peer (P2P) networks. The protocol consists of two parts--the joining process and the reb...
Kin Wah Kwong, Danny H. K. Tsang
AIEDAM
2004
77views more  AIEDAM 2004»
13 years 8 months ago
The role of trust in distributed design
Automated support of design teams, consisting of both human and automated systems, requires an understanding of the role of trust in distributed design processes. By explicitating ...
Niek J. E. Wijngaards, Hidde M. Boonstra, Frances ...