Sciweavers

321 search results - page 64 / 65
» Testing protocols modeled as FSMs with timing parameters
Sort
View
WECWIS
2002
IEEE
129views ECommerce» more  WECWIS 2002»
15 years 3 months ago
On the Sensitivity of Incremental Algorithms for Combinatorial Auctions
Despite the large amounts of runtime needed to adequately solve a combinatorial auction (CA), existing iterative CA auction protocols require winner determination during every rou...
Ryan Kastner, Christina Hsieh, Miodrag Potkonjak, ...
79
Voted
PLDI
2009
ACM
15 years 5 months ago
TAJ: effective taint analysis of web applications
Taint analysis, a form of information-flow analysis, establishes whether values from untrusted methods and parameters may flow into security-sensitive operations. Taint analysis...
Omer Tripp, Marco Pistoia, Stephen J. Fink, Manu S...
ICAPR
2005
Springer
15 years 3 months ago
Fingerprint Image Enhancement Using STFT Analysis
Contrary to popular belief, despite decades of research in fingerprints, reliable fingerprint recognition is an open problem. Extracting features out of poor quality prints is t...
Sharat Chikkerur, Venu Govindaraju, Alexander N. C...
81
Voted
WSCG
2004
148views more  WSCG 2004»
14 years 11 months ago
Visualization of Dynamic Behaviour of Multi-Agent Systems
The extension of our research on analysis of a single agent or agent communities combining advanced methods of visualization with traditional AI techniques is presented in this pa...
David Rehor, Pavel Slavík, David Kadlecek, ...
96
Voted
TVLSI
2008
176views more  TVLSI 2008»
14 years 10 months ago
A Fuzzy Optimization Approach for Variation Aware Power Minimization During Gate Sizing
Abstract--Technology scaling in the nanometer era has increased the transistor's susceptibility to process variations. The effects of such variations are having a huge impact ...
Venkataraman Mahalingam, N. Ranganathan, J. E. Har...