Sciweavers

321 search results - page 64 / 65
» Testing protocols modeled as FSMs with timing parameters
Sort
View
WECWIS
2002
IEEE
129views ECommerce» more  WECWIS 2002»
13 years 10 months ago
On the Sensitivity of Incremental Algorithms for Combinatorial Auctions
Despite the large amounts of runtime needed to adequately solve a combinatorial auction (CA), existing iterative CA auction protocols require winner determination during every rou...
Ryan Kastner, Christina Hsieh, Miodrag Potkonjak, ...
PLDI
2009
ACM
14 years 17 days ago
TAJ: effective taint analysis of web applications
Taint analysis, a form of information-flow analysis, establishes whether values from untrusted methods and parameters may flow into security-sensitive operations. Taint analysis...
Omer Tripp, Marco Pistoia, Stephen J. Fink, Manu S...
ICAPR
2005
Springer
13 years 11 months ago
Fingerprint Image Enhancement Using STFT Analysis
Contrary to popular belief, despite decades of research in fingerprints, reliable fingerprint recognition is an open problem. Extracting features out of poor quality prints is t...
Sharat Chikkerur, Venu Govindaraju, Alexander N. C...
WSCG
2004
148views more  WSCG 2004»
13 years 7 months ago
Visualization of Dynamic Behaviour of Multi-Agent Systems
The extension of our research on analysis of a single agent or agent communities combining advanced methods of visualization with traditional AI techniques is presented in this pa...
David Rehor, Pavel Slavík, David Kadlecek, ...
TVLSI
2008
176views more  TVLSI 2008»
13 years 5 months ago
A Fuzzy Optimization Approach for Variation Aware Power Minimization During Gate Sizing
Abstract--Technology scaling in the nanometer era has increased the transistor's susceptibility to process variations. The effects of such variations are having a huge impact ...
Venkataraman Mahalingam, N. Ranganathan, J. E. Har...