Sciweavers

20638 search results - page 4017 / 4128
» Network Computing
Sort
View
EDCC
2008
Springer
13 years 10 months ago
A Distributed Approach to Autonomous Fault Treatment in Spread
This paper presents the design and implementation of the Distributed Autonomous Replication Management (DARM) framework built on top of the Spread group communication system. The ...
Hein Meling, Joakim L. Gilje
ESOP
2008
Springer
13 years 10 months ago
A Formal Implementation of Value Commitment
In an optimistic approach to security, one can often simplify protocol design by relying on audit logs, which can be analyzed a posteriori. Such auditing is widely used in practice...
Cédric Fournet, Nataliya Guts, Francesco Za...
SODA
2008
ACM
118views Algorithms» more  SODA 2008»
13 years 9 months ago
Geodesic Delaunay triangulation and witness complex in the plane
We introduce a new feature size for bounded domains in the plane endowed with an intrinsic metric. Given a point x in a domain X, the homotopy feature size of X at x measures half...
Jie Gao, Leonidas J. Guibas, Steve Oudot, Yue Wang
WSC
1997
13 years 9 months ago
MODSIM III - A Tutorial
This tutorial introduces the MODSIM III language, showing how its simulation "world view" together with its object-oriented architecture and built in graphics contribute...
John Goble
ISMB
1994
13 years 9 months ago
Stochastic Motif Extraction Using Hidden Markov Model
In this paper, westudy the application of an ttMM(hidden Markov model) to the problem of representing protein sequencesby a stochastic motif. Astochastic protein motif represents ...
Yukiko Fujiwara, Minoru Asogawa, Akihiko Konagaya
« Prev « First page 4017 / 4128 Last » Next »