Sciweavers

1855 search results - page 250 / 371
» Probabilistic Frame-Based Systems
Sort
View
SIGCSE
2000
ACM
193views Education» more  SIGCSE 2000»
15 years 2 months ago
Experimentation with bounded buffer synchronization
Undergraduates are usually introduced to synchronization in operating systems through a discussion of classical problems such as reader-writer or producers-consumers. The traditio...
Steven Robbins
ASIACRYPT
2000
Springer
15 years 2 months ago
Key Improvements to XTR
Abstract. This paper describes improved methods for XTR key representation and parameter generation (cf. [4]). If the field characteristic is properly chosen, the size of the XTR ...
Arjen K. Lenstra, Eric R. Verheul
ICRA
1999
IEEE
155views Robotics» more  ICRA 1999»
15 years 2 months ago
3-D Cueing: A Data Filter for Object Recognition
This paper presents a novel method for quickly filtering range data points to make object recognition in large 3D data sets feasible. The general approach, called "3D cueing,...
Owen T. Carmichael, Martial Hebert
ICDCS
1997
IEEE
15 years 2 months ago
Secure Reliable Multicast Protocols in a WAN
A secure reliable multicast protocol enables a process to send a message to a group of recipients such that all correct destinations receive the same message, despite the maliciou...
Dahlia Malkhi, Michael Merritt, Ohad Rodeh
TACAS
1998
Springer
131views Algorithms» more  TACAS 1998»
15 years 2 months ago
Detecting Races in Relay Ladder Logic Programs
Relay Ladder Logic (RLL) [4] is a programming language widely used for complex embedded control applications such as manufacturing and amusement park rides. The cost of bugs in RLL...
Alexander Aiken, Manuel Fähndrich, Zhendong S...