Sciweavers

372 search results - page 50 / 75
» From Data to Events: Checking Properties on the Control of a...
Sort
View
CIKM
2001
Springer
14 years 1 months ago
Managing Trust in a Peer-2-Peer Information System
Managing trust is a problem of particular importance in peer-to-peer environments where one frequently encounters unknown agents. Existing methods for trust management, that are b...
Karl Aberer, Zoran Despotovic
UAIS
2010
13 years 3 months ago
Auditory universal accessibility of data tables using naturally derived prosody specification
Abstract Text documents usually embody visually oriented meta-information in the form of complex visual structures, such as tables. The semantics involved in such objects result in...
Dimitris Spiliotopoulos, Gerasimos Xydas, Georgios...
IPCV
2007
13 years 10 months ago
Use of Paraplanar Constraint for Parallel Inspection of Wafer Bump Heights
- The shrunk dimension of electronic devices leads to more stringent requirement on process control and quality assurance of their fabrication. For instance, direct die-to-die bond...
Mei Dong, Ronald Chung, Edmund Y. Lam, Kenneth S. ...
IMC
2009
ACM
14 years 3 months ago
Internet optometry: assessing the broken glasses in internet reachability
Reachability is thought of as the most basic service provided by today’s Internet. Unfortunately, this does not imply that the community has a deep understanding of it. Research...
Randy Bush, Olaf Maennel, Matthew Roughan, Steve U...
ICSE
2009
IEEE-ACM
14 years 9 months ago
Analyzing critical process models through behavior model synthesis
Process models capture tasks performed by agents together with their control flow. Building and analyzing such models is important but difficult in certain areas such as safety-cr...
Christophe Damas, Bernard Lambeau, Francois Roucou...