Sciweavers

9110 search results - page 1820 / 1822
» Formally-Based Design Evaluation
Sort
View
JSS
2011
150views more  JSS 2011»
13 years 1 months ago
A novel general framework for automatic and cost-effective handling of recoverable temporal violations in scientific workflow sy
Due to the complex nature of scientific workflow environments, temporal violations often take place and may severely reduce the timeliness of the execution’s results. To handle ...
Xiao Liu, Zhiwei Ni, Zhangjun Wu, Dong Yuan, Jinju...
CVPR
2011
IEEE
13 years 1 months ago
Stable Multi-Target Tracking in Real-Time Surveillance Video
The majority of existing pedestrian trackers concentrate on maintaining the identities of targets, however systems for remote biometric analysis or activity recognition in surveill...
Ben Benfold and Ian Reid
CORR
2011
Springer
175views Education» more  CORR 2011»
12 years 11 months ago
Cooperative Defense Against Pollution Attacks in Network Coding Using SpaceMac
Abstract—Intra-session network coding is known to be vulnerable to pollution attacks. In this work, first, we introduce a novel homomorphic MAC scheme called SpaceMac, which all...
Anh Le, Athina Markopoulou
CORR
2011
Springer
160views Education» more  CORR 2011»
12 years 11 months ago
Searching for Bayesian Network Structures in the Space of Restricted Acyclic Partially Directed Graphs
Although many algorithms have been designed to construct Bayesian network structures using different approaches and principles, they all employ only two methods: those based on i...
Silvia Acid, Luis M. de Campos
CORR
2011
Springer
201views Education» more  CORR 2011»
12 years 11 months ago
On the Weakenesses of Correlation
The correlation of the result lists provided by search engines is fundamental and it has deep and multidisciplinary ramifications. Here, we present automatic and unsupervised met...
Paolo D'Alberto, Ali Dasdan
« Prev « First page 1820 / 1822 Last » Next »