Sciweavers

1064 search results - page 199 / 213
» Disjoint Systems (Extended Abstract)
Sort
View
140
Voted
IPPS
1998
IEEE
15 years 7 months ago
Runtime Support for Virtual BSP Computer
Abstract. Several computing environments including wide area networks and nondedicated networks of workstations are characterized by frequent unavailability of the participating ma...
Mohan V. Nibhanupudi, Boleslaw K. Szymanski
218
Voted
ICARIS
2010
Springer
15 years 4 months ago
Biomedical Article Classification Using an Agent-Based Model of T-Cell Cross-Regulation
Abstract. We propose a novel bio-inspired solution for biomedical article classification. Our method draws from an existing model of T-cell cross-regulation in the vertebrate immun...
Alaa Abi-Haidar, Luis Mateus Rocha
CORR
2007
Springer
117views Education» more  CORR 2007»
15 years 3 months ago
Perfectly Secure Steganography: Capacity, Error Exponents, and Code Constructions
An analysis of steganographic systems subject to the following perfect undetectability condition is presented in this paper. Following embedding of the message into the covertext,...
Ying Wang, Pierre Moulin
151
Voted
SIGSOFT
2007
ACM
16 years 4 months ago
Quantitative verification: models techniques and tools
Automated verification is a technique for establishing if certain properties, usually expressed in temporal logic, hold for a system model. The model can be defined using a high-l...
Marta Z. Kwiatkowska
CHI
2006
ACM
16 years 3 months ago
Beyond record and play: backpacks: tangible modulators for kinetic behavior
Digital Manipulatives embed computation in familiar children's toys and provide means for children to design behavior. Some systems use "record and play" as a form ...
Hayes Raffle, Amanda J. Parkes, Hiroshi Ishii, Jos...