Sciweavers

1644 search results - page 60 / 329
» Finding Dominators in Practice
Sort
View
HICSS
2009
IEEE
189views Biometrics» more  HICSS 2009»
14 years 3 months ago
Predicting Change: A Study of the Value Frequency Model for Change of Practice
Information systems (IS) researchers have made considerable progress on defining and formalizing structured methods to support collaborative development of information systems. Co...
Robert O. Briggs, John D. Murphy, Thomas F. Carlis...
DAC
2004
ACM
14 years 15 days ago
Practical repeater insertion for low power: what repeater library do we need?
In this paper, we investigate the problem of repeater insertion for low power under a given timing budget. We propose a novel repeater insertion algorithm to compute the optimal r...
Xun Liu, Yuantao Peng, Marios C. Papaefthymiou
ALGORITHMICA
1999
141views more  ALGORITHMICA 1999»
13 years 8 months ago
Design and Implementation of a Practical Parallel Delaunay Algorithm
Abstract. This paper describes the design and implementation of a practical parallel algorithm for Delaunay triangulation that works well on general distributions. Although there h...
Guy E. Blelloch, Jonathan C. Hardwick, Gary L. Mil...
HICSS
2002
IEEE
138views Biometrics» more  HICSS 2002»
14 years 1 months ago
Artificial Computer-Assisted International Negotiation: A Tool for Research and Practice
We propose a web-based computer-assisted tool for diagnosing progress in international negotiation. The system is based on a general linear model. Innovative features of the progr...
Daniel Druckman, Richard Harris, Bennett Ramberg
CCS
2008
ACM
13 years 10 months ago
A practical mimicry attack against powerful system-call monitors
System-call monitoring has become the basis for many hostbased intrusion detection as well as policy enforcement techniques. Mimicry attacks attempt to evade system-call monitorin...
Chetan Parampalli, R. Sekar, Rob Johnson