Sciweavers

2938 search results - page 547 / 588
» On obfuscating point functions
Sort
View
COMPSAC
2002
IEEE
15 years 10 months ago
Dependency Analysis and Visualization as Tools to Prolong System Life
This paper describes our experience using dependency analysis and visualization as a tool to identify intervention points for migrating applications to environments where they can...
Dave McComb, Simon Robe, Simon Hoare, Stew Crawfor...
DSN
2002
IEEE
15 years 10 months ago
Model Checking Performability Properties
Model checking has been introduced as an automated technique to verify whether functional properties, expressed in a formal logic like computational tree logic (CTL), do hold in a...
Boudewijn R. Haverkort, Lucia Cloth, Holger Herman...
HICSS
2002
IEEE
138views Biometrics» more  HICSS 2002»
15 years 10 months ago
Artificial Computer-Assisted International Negotiation: A Tool for Research and Practice
We propose a web-based computer-assisted tool for diagnosing progress in international negotiation. The system is based on a general linear model. Innovative features of the progr...
Daniel Druckman, Richard Harris, Bennett Ramberg
ICPPW
2002
IEEE
15 years 10 months ago
SNOW: Software Systems for Process Migration in High-Performance, Heterogeneous Distributed Environments
This paper reports our experiences on the Scalable Network Of Workstation (SNOW) project, which implements a novel methodology to support user-level process migration for traditio...
Kasidit Chanchio, Xian-He Sun
ISMAR
2002
IEEE
15 years 10 months ago
Exploring Humanistic Intelligence Through Physiologically Mediated Reality
We present a way of making the wearing of a lifelong electrocardiographic health monitor fun for a user. The health monitor is coupled with a reality mediator device to create a P...
James Fung, Steve Mann