Sciweavers

5948 search results - page 283 / 1190
» Computing Robust Counter-Strategies
Sort
View
FTCS
1997
115views more  FTCS 1997»
15 years 5 months ago
Robust Emulation of Shared Memory Using Dynamic Quorum-Acknowledged Broadcasts
This paper presents robust emulation of multi-writer/multi-reader registers in message-passing systems using dynamic quorum con gurations. In addition to processor and link failur...
Nancy A. Lynch, Alexander A. Shvartsman
BIOINFORMATICS
2010
138views more  BIOINFORMATICS 2010»
15 years 4 months ago
Robust unmixing of tumor states in array comparative genomic hybridization data
Motivation: Tumorigenesis is an evolutionary process by which tumor cells acquire sequences of mutations leading to increased growth, invasiveness, and eventually metastasis. It i...
David Tolliver, Charalampos E. Tsourakakis, Ayshwa...
ICCAD
2006
IEEE
152views Hardware» more  ICCAD 2006»
16 years 1 months ago
Fast and robust quadratic placement combined with an exact linear net model
— This paper presents a robust quadratic placement approach, which offers both high-quality placements and excellent computational efficiency. The additional force which distrib...
Peter Spindler, Frank M. Johannes
WIMOB
2008
IEEE
15 years 10 months ago
A Moderate to Robust Game Theoretical Model for Intrusion Detection in MANETs
—One popular solution for reducing the resource consumption of Intrusion Detection System (IDS) in MANET is to elect a head-cluster (leader) to provide intrusion detection servic...
Hadi Otrok, Noman Mohammed, Lingyu Wang, Mourad De...
ATAL
2007
Springer
15 years 10 months ago
Towards using multiple cues for robust object recognition
A robot’s ability to assist humans in a variety of tasks, e.g. in search and rescue or in a household, heavily depends on the robot’s reliable recognition of the objects in th...
Sarah Aboutalib, Manuela M. Veloso