Sciweavers

10870 search results - page 2022 / 2174
» Model Checking Programs
Sort
View
HICSS
2009
IEEE
126views Biometrics» more  HICSS 2009»
15 years 5 months ago
Specifying and Analyzing Workflows for Automated Identification and Data Capture
Humans use computers to carry out tasks that neither is able to do easily alone: humans provide eyes, hands, and judgment while computers provide computation, networking, and stor...
Elsa L. Gunter, Ayesha Yasmeen, Carl A. Gunter, An...
AINA
2004
IEEE
15 years 5 months ago
Wide-Area Real-Time Distributed Computing in a Tightly Managed Optical Grid - An Optiputer Vision
: Wide area network (WAN) -based distributed computing (DC) has become an active field of research, especially under the label of grid computing. On the other hand, research on WAN...
K. H. (Kane) Kim
128
Voted
CASSIS
2004
Springer
15 years 5 months ago
Verification of Safety Properties in the Presence of Transactions
The JAVA CARD transaction mechanism can ensure that a sequence of statements either is executed to completion or is not executed at all. Transactions make verification of JAVA CARD...
Reiner Hähnle, Wojciech Mostowski
APPROX
2006
Springer
120views Algorithms» more  APPROX 2006»
15 years 5 months ago
Single-Source Stochastic Routing
Abstract. We introduce and study the following model for routing uncertain demands through a network. We are given a capacitated multicommodity flow network with a single source an...
Shuchi Chawla, Tim Roughgarden
CCGRID
2004
IEEE
15 years 5 months ago
High performance LU factorization for non-dedicated clusters
This paper describes an implementation of parallel LU factorization. The focus is to achieve high performance on non-dedicated clusters, where the number of available computing re...
Toshio Endo, Kenji Kaneda, Kenjiro Taura, Akinori ...
« Prev « First page 2022 / 2174 Last » Next »