Sciweavers

83 search results - page 13 / 17
» Conformon-P Systems with Negative Values
Sort
View
TRECVID
2008
13 years 9 months ago
Florida International University and University of Miami TRECVID 2008 - High Level Feature Extraction
This paper describes the FIU-UM group TRECVID 2008 high level feature extraction task submission. We have used a correlation based video semantic concept detection system for this...
Guy Ravitz, Lin Lin, Mei-Ling Shyu, Michael Armell...
DAIS
2009
13 years 8 months ago
Exploiting Synergies between Coexisting Overlays
Overlay networks have emerged as a powerful paradigm to realise a large range of distributed services. However, as the number of overlays grows and the systems that use them become...
Shen Lin 0003, François Taïani, Gordon...
IANDC
2008
128views more  IANDC 2008»
13 years 7 months ago
Rule-based static analysis of network protocol implementations
Today's software systems communicate over the Internet using standard protocols that have been heavily scrutinized, providing some assurance of resistance to malicious attack...
Octavian Udrea, Cristian Lumezanu, Jeffrey S. Fost...
TWC
2008
85views more  TWC 2008»
13 years 7 months ago
Bandwidth partitioning in decentralized wireless networks
This paper addresses the following question, which is of interest in the design of a multiuser decentralized network. Given a total system bandwidth of W Hz and a fixed data rate c...
Nihar Jindal, Jeffrey G. Andrews, Steven Weber
ECOOP
2009
Springer
14 years 8 months ago
Checking Framework Interactions with Relationships
Software frameworks impose constraints on how plugins may interact with them. Many of hese constraints involve multiple objects, are temporal, and depend on runtime values. Additi...
Ciera Jaspan, Jonathan Aldrich