Sciweavers

1562 search results - page 301 / 313
» A case study in testing a network security algorithm
Sort
View
TCSV
2008
177views more  TCSV 2008»
13 years 7 months ago
An ICA Mixture Hidden Markov Model for Video Content Analysis
In this paper, a new theoretical framework based on hidden Markov model (HMM) and independent component analysis (ICA) mixture model is presented for content analysis of video, nam...
Jian Zhou, Xiao-Ping Zhang
CODES
2011
IEEE
12 years 7 months ago
Analysis and optimization of fault-tolerant task scheduling on multiprocessor embedded systems
Reliability is a major requirement for most safety-related systems. To meet this requirement, fault-tolerant techniques such as hardware replication and software re-execution are ...
Jia Huang, Jan Olaf Blech, Andreas Raabe, Christia...
GIS
2007
ACM
14 years 1 months ago
Cell-based generalization of 3D building groups with outlier management
In this paper, we present a technique that generalizes 3D building groups of virtual 3D city models according to a cell structure that is derived from infrastructure networks. In ...
Tassilo Glander, Jürgen Döllner
SODA
2003
ACM
157views Algorithms» more  SODA 2003»
13 years 8 months ago
Competitive queueing policies for QoS switches
We consider packet scheduling in a network providing differentiated services, where each packet is assigned a value. We study various queueing models for supporting QoS (Quality ...
Nir Andelman, Yishay Mansour, An Zhu
ATAL
2010
Springer
13 years 8 months ago
Collective decision-making in multi-agent systems by implicit leadership
Coordination within decentralized agent groups frequently requires reaching global consensus, but typical hierarchical approaches to reaching such decisions can be complex, slow, ...
Chih-Han Yu, Justin Werfel, Radhika Nagpal