Sciweavers

7379 search results - page 1379 / 1476
» How Many Clusters
Sort
View
ICNP
1999
IEEE
14 years 2 months ago
Automated Protocol Implementations Based on Activity Threads
In this paper we present a new approach for the automated mapping of formal descriptions into activity thread implementations. Our approach resolves semantic conflicts by reorderi...
Peter Langendörfer, Hartmut König
ICPP
1999
IEEE
14 years 2 months ago
An Offline Algorithm for Dimension-Bound Analysis
The vector-clock size necessary to characterize causality in a distributed computation is bounded by the dimension of the partial order induced by that computation. In an arbitrar...
Paul A. S. Ward
AIMDM
1999
Springer
14 years 2 months ago
Active Shape Models for Customised Prosthesis Design
Abstract. Images and computer graphics play an increasingly important role in the design and manufacture of medical prostheses and implants. Images provide guidance on optimal desi...
Tim J. Hutton, Peter Hammond, John C. Davenport
CHES
1999
Springer
133views Cryptology» more  CHES 1999»
14 years 2 months ago
Random Number Generators Founded on Signal and Information Theory
The strength of a cryptographic function depends on the amount of entropy in the cryptovariables that are used as keys. Using a large key length with a strong algorithm is false co...
David Paul Maher, Robert J. Rance
ECOOP
1999
Springer
14 years 2 months ago
Foundations for Virtual Types
Virtual types have been proposed as a notation for generic programming in object-oriented languages—an alternative to the more familiar mechanism of parametric classes. The trade...
Atsushi Igarashi, Benjamin C. Pierce
« Prev « First page 1379 / 1476 Last » Next »