Sciweavers

3207 search results - page 540 / 642
» A Semantics for HTN Methods
Sort
View
109
Voted
IFIP
2009
Springer
15 years 9 months ago
A Calculus of Trustworthy Ad Hoc Networks
We propose a process calculus for mobile ad hoc networks which embodies a behaviour-based multilevel decentralised trust model. Our trust model supports both direct trust, by monit...
Massimo Merro, Eleonora Sibilio
129
Voted
IWMM
2009
Springer
122views Hardware» more  IWMM 2009»
15 years 9 months ago
Parametric heap usage analysis for functional programs
This paper presents an analysis that derives a formula describing the worst-case live heap space usage of programs in a functional language with automated memory management (garba...
Leena Unnikrishnan, Scott D. Stoller
112
Voted
SEMWEB
2009
Springer
15 years 9 months ago
Functions over RDF Language Elements
Spreadsheet tools are often used in business and private scenarios in order to collect and store data, and to explore and analyze these data by executing functions and aggregation...
Bernhard Schandl
127
Voted
MM
2009
ACM
177views Multimedia» more  MM 2009»
15 years 9 months ago
Perceptual quality assessment based on visual attention analysis
Most existing quality metrics do not take the human attention analysis into account. Attention to particular objects or regions is an important attribute of human vision and perce...
Junyong You, Andrew Perkis, Miska M. Hannuksela, M...
161
Voted
MM
2009
ACM
138views Multimedia» more  MM 2009»
15 years 9 months ago
WOW: wild-open warning for broadcast basketball video based on player trajectory
In basketball games, wild-open means that there is an offensive player not well defended by his/her opponents. The occurrence of wild-open usually implies the existence of a succe...
Ming-Hsiu Chang, Ming-Chun Tien, Ja-Ling Wu