Sciweavers

546 search results - page 67 / 110
» Using and Detecting Links in Wikipedia
Sort
View
ISSTA
2010
ACM
15 years 2 months ago
Analysis of invariants for efficient bounded verification
SAT-based bounded verification of annotated code consists of translating the code together with the annotations to a propositional formula, and analyzing the formula for specifica...
Juan P. Galeotti, Nicolás Rosner, Carlos L&...
IMC
2007
ACM
15 years 2 months ago
A data streaming algorithm for estimating entropies of od flows
Entropy has recently gained considerable significance as an important metric for network measurement. Previous research has shown its utility in clustering traffic and detecting ...
Haiquan (Chuck) Zhao, Ashwin Lall, Mitsunori Ogiha...
76
Voted
AGIS
2000
54views more  AGIS 2000»
15 years 10 days ago
The Application of Earth Science Findings to the Practical Problems of Growing Winegrapes
Transforming science findings into practical applications is presented in the specific case of using remote sensing to detect the presence of an infestation of grapevines. The vin...
David L. Peterson, Lee F. Johnson
SIAMCOMP
2000
74views more  SIAMCOMP 2000»
15 years 8 days ago
On Quiescent Reliable Communication
We study the problem of achieving reliable communication with quiescent algorithms (i.e., algorithms that eventually stop sending messages) in asynchronous systems with process cra...
Marcos Kawazoe Aguilera, Wei Chen, Sam Toueg
86
Voted
CHI
2003
ACM
16 years 26 days ago
A tangible interface for IP network simulation
We present the IP Network Design Workbench which supports collaborative network design and simulation by a group of experts and customers. This system is based on a tangible user ...
Kazue Kobayashi, Mitsunori Hirano, Atsunobu Narita...