Sciweavers

434 search results - page 29 / 87
» The Case for Browser Provenance
Sort
View
WSC
2004
13 years 10 months ago
An Adaptive Approach to Fast Simulation of Traffic Groomed Optical Networks
In this paper, we consider the fast simulation of traffic groomed optical networks, in which multiple sub-rate traffic streams may be carried on the same wavelength. For real-size...
Chih-Chieh Hsu, Michael Devetsikiotis
ICMAS
1998
13 years 10 months ago
Heterogeneity, Stability, and Efficiency in Distributed Systems
This paper explores the increasing the heterogeneity of an agent population to stabilize decentralized systems by adding bias terms to each agent's expected payoffs. Two appr...
James D. Thomas, Katia P. Sycara
SCP
2011
255views Communications» more  SCP 2011»
13 years 3 months ago
Map fusion for nested datatypes in intensional type theory
A definitional extension LNGMIt of the Calculus of Inductive Constructions (CIC), that underlies the proof assistant Coq, is presented that allows also to program with nested dat...
Ralph Matthes
NSDI
2010
13 years 10 months ago
Mugshot: Deterministic Capture and Replay for JavaScript Applications
Mugshot is a system that captures every event in an executing JavaScript program, allowing developers to deterministically replay past executions of web applications. Replay is us...
James Mickens, Jeremy Elson, Jon Howell
IPMI
2005
Springer
14 years 9 months ago
Multi-object Segmentation Using Shape Particles
Deformable template models, in which a shape model and its corresponding appearance model are deformed to optimally fit an object in the image, have proven successful in many medic...
Marleen de Bruijne, Mads Nielsen