Sciweavers

885 search results - page 136 / 177
» On Additive and Multiplicative Fuzzy Models
Sort
View
ISSTA
2006
ACM
14 years 2 months ago
Improving distributed memory applications testing by message perturbation
We present initial work on perturbation techniques that cause the manifestation of timing-related bugs in distributed memory Message Passing Interface (MPI)-based applications. Th...
Richard W. Vuduc, Martin Schulz, Daniel J. Quinlan...
CRV
2005
IEEE
191views Robotics» more  CRV 2005»
14 years 2 months ago
Automated Behavioral Phenotype Detection and Analysis Using Color-Based Motion Tracking
The problem of elucidating the functional significance of genes is a key challenge of modern science. Solving this problem can lead to fundamental advancements across multiple are...
Alan Shimoide, Ilmi Yoon, Megumi Fuse, Holly C. Be...
ACNS
2005
Springer
116views Cryptology» more  ACNS 2005»
14 years 2 months ago
Two-Server Password-Only Authenticated Key Exchange
Typical protocols for password-based authentication assume a single server which stores all the information (e.g., the password) necessary to authenticate a user. Unfortunately, a...
Jonathan Katz, Philip D. MacKenzie, Gelareh Taban,...
IPSN
2005
Springer
14 years 2 months ago
Tracking on a graph
Abstract— This paper considers the problem of tracking objects with sparsely located binary sensors. Tracking with a sensor network is a challenging task due to the inaccuracy of...
Songhwai Oh, Shankar Sastry
LAMAS
2005
Springer
14 years 2 months ago
The Success and Failure of Tag-Mediated Evolution of Cooperation
Use of tags to limit partner selection for playing has been shown to produce stable cooperation in agent populations playing the Prisoner’s Dilemma game. There is, however, a lac...
Austin McDonald, Sandip Sen