Sciweavers

1920 search results - page 369 / 384
» The Range Constraint: Algorithms and Implementation
Sort
View
FSE
2005
Springer
108views Cryptology» more  FSE 2005»
14 years 27 days ago
Unbiased Random Sequences from Quasigroup String Transformations
Abstract. The need of true random number generators for many purposes (ranging from applications in cryptography and stochastic simulation, to search heuristics and game playing) i...
Smile Markovski, Danilo Gligoroski, Ljupco Kocarev
NPAR
2004
ACM
14 years 24 days ago
IMPaSTo: a realistic, interactive model for paint
We present a paint model for use in interactive painting systems that captures a wide range of styles similar to oils or acrylics. The model includes both a numerical simulation t...
William V. Baxter III, Jeremy D. Wendt, Ming C. Li...
CLUSTER
2002
IEEE
14 years 10 days ago
Scalable Resource Management in High Performance Computers
Clusters of workstations have emerged as an important platform for building cost-effective, scalable, and highlyavailable computers. Although many hardware solutions are available...
Eitan Frachtenberg, Fabrizio Petrini, Juan Fern&aa...
AGENTS
2001
Springer
13 years 12 months ago
The intelligent classroom: providing competent assistance
In the software industry, designers are forever trying to “improve” their products by adding ever more features to them, producing bloated software systems that are capable of...
David Franklin, Kristian J. Hammond
ICNP
2000
IEEE
13 years 11 months ago
A Scalable Monitoring Approach for Service Level Agreements Validation
In order to detect violations of end-to-end service level agreements (SLA) and to isolate trouble links and nodes based on a unified framework, managers of a service provider net...
Mun Choon Chan, Yow-Jian Lin, Xin Wang