Sciweavers

1045 search results - page 114 / 209
» The Use of Exceptions
Sort
View
RTSS
2007
IEEE
14 years 2 months ago
Robust Priority Assignment for Fixed Priority Real-Time Systems
This paper focuses on priority assignment for realtime systems using fixed priority scheduling. It introduces and defines the concept of a “robust” priority ordering: the most...
Robert I. Davis, Alan Burns
ICCSA
2007
Springer
14 years 2 months ago
Public Key Encryption with Keyword Search Based on K-Resilient IBE
An encrypted email is sent from Bob to Alice. A gateway wants to check whether a certain keyword exists in an email or not for some reason (e.g. routing). Nevertheless Alice does n...
Dalia Khader
ICDM
2006
IEEE
84views Data Mining» more  ICDM 2006»
14 years 2 months ago
Exploratory Under-Sampling for Class-Imbalance Learning
Under-sampling is a class-imbalance learning method which uses only a subset of major class examples and thus is very efficient. The main deficiency is that many major class exa...
Xu-Ying Liu, Jianxin Wu, Zhi-Hua Zhou
ACMACE
2006
ACM
14 years 2 months ago
A stylized cartoon hair renderer
This paper describes a new hair rendering technique for Anime characters. The overall goal is to improve current cel shaders by introducing a new hair model and hair shader. The h...
Jung Shin, Michael Haller, R. Mukundan
ICAC
2005
IEEE
14 years 1 months ago
Myrrh: A Transaction-Based Model for Autonomic Recovery
As software comes under increasing scrutiny for its lack of safety and reliability, numerous static and partially dynamic tools (including model checking) have been proposed for v...
Guy Eddon, Steven P. Reiss