Sciweavers

4137 search results - page 673 / 828
» On the number of matchings of a tree
Sort
View
SPIN
2009
Springer
14 years 2 months ago
Fast, All-Purpose State Storage
Existing techniques for approximate storage of visited states in a model checker are too special-purpose and too DRAM-intensive. Bitstate hashing, based on Bloom filters, is good ...
Peter C. Dillinger, Panagiotis Manolios
ESEM
2009
ACM
14 years 2 months ago
Optimized assignment of developers for fixing bugs an initial evaluation for eclipse projects
Decisions on “Who should fix this bug” have substantial impact on the duration of the process and its results. In this paper, optimized strategies for the assignment of the ...
Md. Mainur Rahman, Günther Ruhe, Thomas Zimme...
ACSAC
2008
IEEE
14 years 2 months ago
A Survey to Guide Group Key Protocol Development
A large number of papers have proposed cryptographic protocols for establishing secure group communication. These protocols allow group members to exchange or establish keys to en...
Ahren Studer, Christina Johns, Jaanus Kase, Kyle O...
AVSS
2008
IEEE
14 years 2 months ago
Camera Handoff with Adaptive Resource Management for Multi-camera Multi-target Surveillance
Camera handoff is a crucial step to generate a continuously tracked and consistently labeled trajectory of the object of interest in multi-camera surveillance systems. Most existi...
Chung-Hao Chen, Yi Yao, David L. Page, Besma Roui-...
COMPSAC
2008
IEEE
14 years 2 months ago
Parallel Table Lookup for Next Generation Internet
The rapid growth of Internet population leads to the shortage of IP addresses. The next generation IP protocol, IPv6, which extends the IP address length from 32 bits to 128 bits,...
Li-Che Hung, Yaw-Chung Chen