Sciweavers

152 search results - page 13 / 31
» Discovering Identity Problems: A Case Study
Sort
View
JCT
2007
85views more  JCT 2007»
13 years 9 months ago
Avoider-Enforcer games
In numerous positional games the identity of the winner is easily determined. In this case one of the more interesting questions is not who wins but rather how fast can one win. T...
Dan Hefetz, Michael Krivelevich, Tibor Szabó...
ICPPW
2002
IEEE
14 years 2 months ago
A Statistical Approach for the Analysis of the Relation Between Low-Level Performance Information, the Code, and the Environment
This paper presents a methodology for aiding a scientific programmer to evaluate the performance of parallel programs on advanced architectures. It applies well-defined design o...
Nayda G. Santiago, Diane T. Rover, Domingo Rodr&ia...
P2P
2010
IEEE
136views Communications» more  P2P 2010»
13 years 7 months ago
On the Privacy of Peer-Assisted Distribution of Security Patches
Abstract--When a host discovers that it has a software vulnerability that is susceptible to an attack, the host needs to obtain and install a patch. Because centralized distributio...
Di Wu, Cong Tang, Prithula Dhungel, Nitesh Saxena,...
ECSA
2010
Springer
13 years 8 months ago
Mining Relationships between the Participants of Architectural Patterns
Abstract Architectural patterns are often combined with other, relevant architectural patterns during software architecture design. However, combining patterns effectively remains ...
Ahmad Waqas Kamal, Paris Avgeriou
IPSN
2004
Springer
14 years 3 months ago
How to distribute sensors in a random field?
In this paper, we study the optimal way of distributing sensors in a random field to minimize the estimation distortion. We show that this problem is equivalent to certain proble...
Xin Zhang, Stephen B. Wicker