Sciweavers

1701 search results - page 303 / 341
» Computer Science and State Machines
Sort
View
CRYPTO
1987
Springer
87views Cryptology» more  CRYPTO 1987»
15 years 3 months ago
How to Make Replicated Data Secure
Many distributed systems manage some form of long-lived data, such as files or data bases. The performance and fault-tolerance of such systems may be enhanced if the repositories ...
Maurice Herlihy, J. D. Tygar
AAAI
2008
15 years 2 months ago
Expectation-Based Versus Potential-Aware Automated Abstraction in Imperfect Information Games: An Experimental Comparison Using
ion-Based Versus Potential-Aware Automated Abstraction in Imperfect Information Games: An Experimental Comparison Using Poker Andrew Gilpin and Tuomas Sandholm Computer Science Dep...
Andrew Gilpin, Tuomas Sandholm
BMCBI
2004
112views more  BMCBI 2004»
14 years 11 months ago
MuTrack: a genome analysis system for large-scale mutagenesis in the mouse
Background: Modern biological research makes possible the comprehensive study and development of heritable mutations in the mouse model at high-throughput. Using techniques spanni...
Erich J. Baker, Leslie Galloway, Barbara Jackson, ...
IVC
2002
143views more  IVC 2002»
14 years 11 months ago
Towards the automatic analysis of complex human body motions
The classification of human body motion is an integral component for the automatic interpretation of video sequences. In a first part we present an effective approach that uses mi...
Jens Rittscher, Andrew Blake, Stephen J. Roberts
ASE
2011
14 years 3 months ago
Alattin: mining alternative patterns for defect detection
Abstract To improve software quality, static or dynamic defect-detection tools accept programming rules as input and detect their violations in software as defects. As these progra...
Suresh Thummalapenta, Tao Xie