Sciweavers

1528 search results - page 11 / 306
» On Signatures for Communication Graphs
Sort
View
ISSTA
2009
ACM
14 years 2 months ago
Identifying bug signatures using discriminative graph mining
Bug localization has attracted a lot of attention recently. Most existing methods focus on pinpointing a single statement or function call which is very likely to contain bugs. Al...
Hong Cheng, David Lo, Yang Zhou, Xiaoyin Wang, Xif...
IROS
2008
IEEE
97views Robotics» more  IROS 2008»
14 years 1 months ago
Graph signature for self-reconfiguration planning
Masoud Asadpour, Alexander Spröwitz, Aude Bil...
PVM
2000
Springer
13 years 11 months ago
Runtime Checking of Datatype Signatures in MPI
Abstract. The MPI standard provides a way to send and receive complex combinations of datatypes (e.g., integers and doubles) with a single communication operation. The MPI standard...
William Gropp
INFOCOM
2008
IEEE
14 years 1 months ago
Spatial Signatures for Lightweight Security in Wireless Sensor Networks
Abstract— This paper experimentally investigates the feasibility of crypto-free communications in resource-constrained wireless sensor networks. We exploit the spatial signature ...
Lifeng Sang, Anish Arora
GLOBECOM
2009
IEEE
14 years 2 months ago
Site-Specific RSS Signature Modeling for WiFi Localization
Brian Roberts, Kaveh Pahlavan