Sciweavers

1261 search results - page 229 / 253
» A Hierarchy of Temporal Properties
Sort
View
ACTA
2011
13 years 3 months ago
Nonatomic dual bakery algorithm with bounded tokens
A simple mutual exclusion algorithm is presented that only uses nonatomic shared variables of bounded size, and that satisfies bounded overtaking. When the shared variables behave...
Alex A. Aravind, Wim H. Hesselink
EJWCN
2010
122views more  EJWCN 2010»
13 years 3 months ago
Using Model Checking for Analyzing Distributed Power Control Problems
Model checking (MC) is a formal verification technique which has known and still knows a resounding success in the computer science community. Realizing that the distributed power...
Thomas Brihaye, Marc Jungers, Samson Lasaulce, Nic...
PAMI
2010
146views more  PAMI 2010»
13 years 3 months ago
A Hierarchical Visual Model for Video Object Summarization
We propose a novel method for removing irrelevant frames from a video given user-provided frame-level labeling for a very small number of frames. We first hypothesize a number of w...
David Liu, Gang Hua, Tsuhan Chen
TMM
2010
178views Management» more  TMM 2010»
13 years 3 months ago
A Lightweight SCTP for Partially Reliable Overlay Video Multicast Service for Mobile Terminals
Abstract--In this article, a video multicast protocol for multihomed mobile terminals is proposed as an alternative stream control transmission protocol (SCTP) for partially reliab...
Jinsuk Baek, Paul S. Fisher, Minho Jo, Hsiao-Hwa C...
IJISEC
2011
71views more  IJISEC 2011»
13 years 8 days ago
Principles of remote attestation
Remote attestation is the activity of making a claim about properties of a target by supplying evidence to an appraiser over a network. We identify five central principles to guid...
George Coker, Joshua D. Guttman, Peter Loscocco, A...