Sciweavers

2357 search results - page 433 / 472
» Computing Refactorings of Behavior Models
Sort
View
FCT
1997
Springer
14 years 17 days ago
Trade-Off Results for Connection Management
A connection management protocol establishes a connection between two hosts across a wide-area network to allow reliable message delivery. Following previous work of Kleinberg et a...
Marios Mavronicolas, Nikos Papadakis
ICSE
2008
IEEE-ACM
14 years 9 months ago
Testing pervasive software in the presence of context inconsistency resolution services
Pervasive computing software adapts its behavior according to the changing contexts. Nevertheless, contexts are often noisy. Context inconsistency resolution provides a cleaner pe...
Heng Lu, W. K. Chan, T. H. Tse
CHI
2004
ACM
14 years 8 months ago
Categorical imperative NOT: facial affect is perceived continuously
Facial affect (or emotion) recognition is a central issue for many VMC and naturalistic computing applications. Most computational models assume "categorical perception"...
Diane J. Schiano, Sheryl M. Ehrlich, Kyle Sheridan
ATAL
2009
Springer
14 years 3 months ago
False name manipulations in weighted voting games: splitting, merging and annexation
An important aspect of mechanism design in social choice protocols and multiagent systems is to discourage insincere and manipulative behaviour. We examine the computational compl...
Haris Aziz, Mike Paterson
GECCO
2009
Springer
130views Optimization» more  GECCO 2009»
14 years 3 months ago
Liposome logic
VLSI research, in its continuous push toward further miniaturisation, is seeking to break through the limitations of current circuit manufacture techniques by moving towards biomi...
James Smaldon, Natalio Krasnogor, Alexander Camero...