Sciweavers

296 search results - page 39 / 60
» Empirical Evaluation of Distributed Mutual Exclusion Algorit...
Sort
View
PERCOM
2005
ACM
14 years 7 months ago
Secure context-sensitive authorization
There is a recent trend toward rule-based authorization systems to achieve flexible security policies. Also, new sensing technologies in pervasive computing make it possible to de...
Kazuhiro Minami, David Kotz
SIGSOFT
2006
ACM
14 years 1 months ago
Memories of bug fixes
The change history of a software project contains a rich collection of code changes that record previous development experience. Changes that fix bugs are especially interesting, ...
Sunghun Kim, Kai Pan, E. James Whitehead Jr.
ALMOB
2007
151views more  ALMOB 2007»
13 years 7 months ago
Local sequence alignments statistics: deviations from Gumbel statistics in the rare-event tail
Background: The optimal score for ungapped local alignments of infinitely long random sequences is known to follow a Gumbel extreme value distribution. Less is known about the imp...
Stefan Wolfsheimer, Bernd Burghardt, Alexander K. ...
AIMSA
2008
Springer
13 years 9 months ago
DynABT: Dynamic Asynchronous Backtracking for Dynamic DisCSPs
Abstract. Constraint Satisfaction has been widely used to model static combinatorial problems. However, many AI problems are dynamic and take place in a distributed environment, i....
Bayo Omomowo, Inés Arana, Hatem Ahriz
CVPR
2008
IEEE
14 years 9 months ago
Histogram-based search: A comparative study
Histograms represent a popular means for feature representation. This paper is concerned with the problem of exhaustive histogram-based image search. Several standard histogram co...
Mikhail Sizintsev, Konstantinos G. Derpanis, Andre...