Sciweavers

5153 search results - page 689 / 1031
» Introduction to Randomized Algorithms
Sort
View
155
Voted
ICPPW
1999
IEEE
15 years 8 months ago
Performance Evaluation of Public-Key Certificate Revocation System with Balanced Hash Tree
A new method for updating certificate revocation trees (CRT) is proposed. Efficient revocation of publickey certificates is a current issue in public-key Infrastructure because a ...
Hiroaki Kikuchi, Kensuke Abe, Shohachiro Nakanishi
EMMCVPR
1999
Springer
15 years 8 months ago
Adaptive Bayesian Contour Estimation: A Vector Space Representation Approach
Abstract. We propose a vector representation approach to contour estimation from noisy data. Images are modeled as random elds composed of a set of homogeneous regions contours (bo...
José M. B. Dias
RTCSA
1999
IEEE
15 years 8 months ago
Non-Blocking Data Sharing in Multiprocessor Real-Time Systems
A non-blocking protocol that allows real-time tasks to share data in a multiprocessor system is presented in this paper. The protocol gives the means to concurrent real-time tasks...
Philippas Tsigas, Yi Zhang
138
Voted
RTSS
1999
IEEE
15 years 8 months ago
Specification and Analysis of Soft Real-Time Systems: Quantity and Quality
This paper presents a process algebra for specifying soft real-time constraints in a compositional way. For these soft constraints we take a stochastic point of view and allow arb...
Pedro R. D'Argenio, Joost-Pieter Katoen, Ed Brinks...
HICSS
1997
IEEE
107views Biometrics» more  HICSS 1997»
15 years 8 months ago
On Heuristic Mapping of Decision Surfaces for Post-Evaluation Analysis
The value for decision making of high-quality postsolution analysis of decision-supporting models can hardly be overestimated. Candle-lighting analysis (CLA) takes this notion ver...
Major Bill Branley, Russell Fradin, Steven O. Kimb...