Sciweavers

1610 search results - page 256 / 322
» Identity Based Multisignatures
Sort
View
PEPM
2009
ACM
14 years 2 months ago
Clone detection and removal for Erlang/OTP within a refactoring environment
A well-known bad code smell in refactoring and software maintenance is duplicated code, or code clones. A code clone is a code fragment that is identical or similar to another. Un...
Huiqing Li, Simon Thompson
EMMCVPR
2001
Springer
14 years 2 months ago
A Hierarchical Markov Random Field Model for Figure-Ground Segregation
To segregate overlapping objects into depth layers requires the integration of local occlusion cues distributed over the entire image into a global percept. We propose to model thi...
Stella X. Yu, Tai Sing Lee, Takeo Kanade
EH
2000
IEEE
81views Hardware» more  EH 2000»
14 years 2 months ago
Toward Self-Repairing and Self-Replicating Hardware: The Embryonics Approach
The growth and operation of all living beings are directed by the interpretation, in each of their cells, of a chemical program, the DNA string or genome. This process is the sour...
Daniel Mange, Moshe Sipper, André Stauffer,...
INFOCOM
2000
IEEE
14 years 2 months ago
REUNITE: A Recursive Unicast Approach to Multicast
—We propose a new multicast protocol called REUNITE. The key idea of REUNITE is to use recursive unicast trees to implement multicast service. REUNITE does not use class D IP add...
Ion Stoica, T. S. Eugene Ng, Hui Zhang
SAC
2000
ACM
14 years 2 months ago
Making Tuple Spaces Safe for Heterogeneous Distributed Systems
Linda is a high level communication model which allows agents to communicate via a shared tuple spaces without knowing each other’s identities and without having to arrange for ...
Naftaly H. Minsky, Yaron Minsky, Victoria Ungurean...