Sciweavers

4890 search results - page 798 / 978
» From system specifications to component behavioral models
Sort
View
HICSS
2003
IEEE
202views Biometrics» more  HICSS 2003»
14 years 4 months ago
Adoption Process of Upgrading Software: An Empirical Study of Windows XP
There are many studies in Information Systems on the adoption of new innovations. This paper, on the other hand, presents the findings of an empirical study, which explores factor...
Michael C. L. Lai, Susanna S. Y. Ho, Wendy W. Y. H...
VRST
2009
ACM
14 years 3 months ago
Crime scene robot and sensor simulation
Virtual reality has been proposed as a training regime for a large number of tasks from surgery rehearsal (cf. [Robb et al. 1996], to combat simulation (cf. [U. S. Congress, Offi...
Robert Codd-Downey, Michael Jenkin
ENTCS
2007
143views more  ENTCS 2007»
13 years 10 months ago
Formal Fault Tree Analysis - Practical Experiences
Safety is an important requirement for many modern systems. To ensure safety of complex critical systems, well-known safety analysis methods have been formalized. This holds in pa...
Frank Ortmeier, Gerhard Schellhorn
CVPR
2011
IEEE
13 years 7 months ago
Identifying Players in Broadcast Sports Videos using Conditional Random Fields
We are interested in the problem of automatic tracking and identification of players in broadcast sport videos shot with a moving camera from a medium distance. While there are m...
Wei-Lwun Lu, Jo-Anne Ting, Kevin Murphy, Jim Littl...
P2P
2008
IEEE
14 years 5 months ago
Incentives Against Hidden Action in QoS Overlays
Peer-to-peer networks providing QoS-enabled services are sensitive to hidden action situations, where the actions of a server peer are hidden from the peers who receive services f...
Raul Landa, Miguel Rio, David Griffin, Richard G. ...