Sciweavers

4890 search results - page 782 / 978
» From system specifications to component behavioral models
Sort
View
IPPS
2010
IEEE
13 years 8 months ago
Stability of a localized and greedy routing algorithm
Abstract--In this work, we study the problem of routing packets between undifferentiated sources and sinks in a network modeled by a multigraph. We consider a distributed and local...
Christelle Caillouet, Florian Huc, Nicolas Nisse, ...
ICWS
2007
IEEE
14 years 6 days ago
Model-driven Composition of Context-aware Web Services Using ContextUML and Aspects
Service Oriented Architectures (SOAs) are constantly gaining ground for the provision of business to business as well as user-centric services, mainly in the form of Web Services ...
George N. Prezerakos, Nikolaos D. Tselikas, Giovan...
ICSE
1999
IEEE-ACM
14 years 3 months ago
A Practical Method for Verifying Event-Driven Software
Formal verification methods are used only sparingly in software development. The most successful methods to date are based on the use of model checking tools. To use such he user ...
Gerard J. Holzmann, Margaret H. Smith
COMPLEXITY
2006
144views more  COMPLEXITY 2006»
13 years 10 months ago
BML revisited: Statistical physics, computer simulation, and probability
Statistical physics, computer simulation and discrete mathematics are intimately related through the study of shared lattice models. These models lie at the foundation of all thre...
Raissa M. D'Souza
PAMI
2006
142views more  PAMI 2006»
13 years 10 months ago
Fingerprint Warping Using Ridge Curve Correspondences
The performance of a fingerprint matching system is affected by the nonlinear deformation introduced in the fingerprint impression during image acquisition. This nonlinear deformat...
Arun Ross, Sarat C. Dass, Anil K. Jain