Sciweavers

305 search results - page 43 / 61
» An Extension of System F with Subtyping
Sort
View
FOAL
2009
ACM
14 years 2 months ago
A machine-checked model of safe composition
Programs of a software product line can be synthesized by composing features which implement some unit of program functionality. In most product lines, only some combination of fe...
Benjamin Delaware, William R. Cook, Don S. Batory
OTM
2007
Springer
14 years 1 months ago
Network Coding Protocols for Secret Key Distribution
Abstract. Recent contributions have uncovered the potential of network coding, i.e. algebraic mixing of multiple information flows in a network, to provide enhanced security in pa...
Paulo F. Oliveira, João Barros
IROS
2006
IEEE
146views Robotics» more  IROS 2006»
14 years 1 months ago
Adaptive Causal Models for Fault Diagnosis and Recovery in Multi-Robot Teams
— This paper presents an adaptive causal model method (adaptive CMM) for fault diagnosis and recovery in complex multi-robot teams. We claim that a causal model approach is effec...
Lynne E. Parker, Balajee Kannan
MIR
2006
ACM
195views Multimedia» more  MIR 2006»
14 years 1 months ago
Automatically selecting shots for action movie trailers
Movie trailers, or previews, are an important method of advertising movies. They are extensively shown before movies in cinemas, as well as on television and increasingly, over th...
Alan F. Smeaton, Bart Lehane, Noel E. O'Connor, Co...
SWS
2004
ACM
14 years 1 months ago
Creating non-decomposable stream bundles in multimedia web services using uSMIL
Technical advances in networks, operating systems and web based services are enabling new web-based services such as audiovisual surveillance, monitoring and recording of unfoldin...
Naren Kodali, Csilla Farkas, Duminda Wijesekera