Sciweavers

6040 search results - page 1030 / 1208
» Generating Instance Models from Meta Models
Sort
View
CLUSTER
2003
IEEE
15 years 7 months ago
Coordinated Checkpoint versus Message Log for Fault Tolerant MPI
— Large Clusters, high availability clusters and Grid deployments often suffer from network, node or operating system faults and thus require the use of fault tolerant programmin...
Aurelien Bouteiller, Pierre Lemarinier, Gér...
SIGGRAPH
2000
ACM
15 years 6 months ago
Acquiring the reflectance field of a human face
We present a method to acquire the reflectance field of a human face and use these measurements to render the face under arbitrary changes in lighting and viewpoint. We first acqu...
Paul E. Debevec, Tim Hawkins, Chris Tchou, Haarm-P...
WSC
2000
15 years 3 months ago
Using simulation and critical points to define states in continuous search spaces
Many artificial intelligence techniques rely on the notion ate" as an abstraction of the actual state of the nd an "operator" as an abstraction of the actions that ...
Marc S. Atkin, Paul R. Cohen
BMCBI
2006
109views more  BMCBI 2006»
15 years 2 months ago
An integrated system for genetic analysis
Background: Large-scale genetic mapping projects require data management systems that can handle complex phenotypes and detect and correct high-throughput genotyping errors, yet a...
Simon Fiddy, David Cattermole, Dong Xie, Xiao Yuan...
CN
2007
91views more  CN 2007»
15 years 2 months ago
Improving the quality of alerts and predicting intruder's next goal with Hidden Colored Petri-Net
Intrusion detection systems (IDS) often provide poor quality alerts, which are insufficient to support rapid identification of ongoing attacks or predict an intruder’s next lik...
Dong Yu, Deborah A. Frincke
« Prev « First page 1030 / 1208 Last » Next »