Sciweavers

611 search results - page 86 / 123
» Testing interfaces that do not exist
Sort
View
AAMAS
2000
Springer
14 years 11 months ago
Coordinating Mutually Exclusive Resources using GPGP
Hospital Patient Scheduling is an inherently distributed problem because of the way real hospitals are organized. As medical procedures have become more complex, and their associat...
Keith Decker, Jinjiang Li
BC
1998
117views more  BC 1998»
14 years 10 months ago
Where did I take that snapshot? Scene-based homing by image matching
In homing tasks, the goal is often not marked by visible objects but must be inferred from the spatial relation to the visual cues in the surrounding scene. The exact computation o...
Matthias O. Franz, Bernhard Schölkopf, Hanspe...
ISAAC
2010
Springer
276views Algorithms» more  ISAAC 2010»
14 years 9 months ago
Anonymous Fuzzy Identity-Based Encryption for Similarity Search
Abstract. In this paper, we consider the problem of predicate encryption and focus on the predicate for testing whether the hamming distance between the attribute X of a data item ...
David W. Cheung, Nikos Mamoulis, W. K. Wong, Siu-M...
301
Voted
BPM
2011
Springer
270views Business» more  BPM 2011»
13 years 11 months ago
Automated Error Correction of Business Process Models
As order dependencies between process tasks can get complex, it is easy to make mistakes in process model design, especially behavioral ones such as deadlocks. Notions such as soun...
Mauro Gambini, Marcello La Rosa, Sara Migliorini, ...
ISSTA
2010
ACM
15 years 3 months ago
Proving memory safety of floating-point computations by combining static and dynamic program analysis
Whitebox fuzzing is a novel form of security testing based on dynamic symbolic execution and constraint solving. Over the last couple of years, whitebox fuzzers have found many ne...
Patrice Godefroid, Johannes Kinder