Sciweavers

6308 search results - page 1084 / 1262
» Modeling Urgency in Timed Systems
Sort
View
WDAG
2005
Springer
67views Algorithms» more  WDAG 2005»
15 years 10 months ago
What Can Be Implemented Anonymously?
Abstract. The vast majority of papers on distributed computing assume that processes are assigned unique identifiers before computation begins. But is this assumption necessary? W...
Rachid Guerraoui, Eric Ruppert
ASIACRYPT
2004
Springer
15 years 10 months ago
Asynchronous Proactive Cryptosystems Without Agreement (Extended Abstract)
d abstract) Bartosz Przydatek1 and Reto Strobl2 1 Department of Computer Science, ETH Z¨urich, Switzerland 2 IBM Research, Zurich Research Laboratory, Switzerland In this paper, w...
Bartosz Przydatek, Reto Strobl
ESAW
2004
Springer
15 years 10 months ago
Motivation-Based Selection of Negotiation Opponents
Abstract. If we are to enable agents to handle increasingly greater levels of complexity, it is necessary to equip them with mechanisms that support greater degrees of autonomy. Th...
Stephen J. Munroe, Michael Luck
MM
2003
ACM
124views Multimedia» more  MM 2003»
15 years 10 months ago
Using structure patterns of temporal and spectral feature in audio similarity measure
Although statistical characteristics of audio features are widely used for similarity measure in most of current audio analysis systems and have been proved to be effective, they ...
Rui Cai, Lie Lu, HongJiang Zhang
PPOPP
2003
ACM
15 years 10 months ago
Automated application-level checkpointing of MPI programs
Because of increasing hardware and software complexity, the running time of many computational science applications is now more than the mean-time-to-failure of highpeformance com...
Greg Bronevetsky, Daniel Marques, Keshav Pingali, ...
« Prev « First page 1084 / 1262 Last » Next »