Sciweavers

139 search results - page 18 / 28
» Modeling the invisible college
Sort
View
COORDINATION
2006
Springer
14 years 1 months ago
Stochastic Reasoning About Channel-Based Component Connectors
Abstract. Constraint automata have been used as an operational model for component connectors that coordinate the cooperation and communication of the components by means of a netw...
Christel Baier, Verena Wolf
COR
2006
84views more  COR 2006»
13 years 10 months ago
Stability and interaction in flatline games
Starting from a given one-shot game played by a finite population of agents living in flatline, a circular or constrained grid structured by the classical definitions of neighborh...
Alexander Mehlmann
BELL
2000
107views more  BELL 2000»
13 years 9 months ago
Automating software feature verification
A significant part of the call processing software for Lucent's new PathStar access server [FSW98] was checked with automated formal verification techniques. The verification...
Gerard J. Holzmann, Margaret H. Smith
CGA
2002
13 years 9 months ago
Unwrapping and Visualizing Cuneiform Tablets
Thousands of historically revealing cuneiform clay tablets, which were inscribed in Mesopotamia millenia ago, still exist today. Visualizing cuneiform writing is important when de...
Sean E. Anderson, Marc Levoy
IEEEHPCS
2010
13 years 4 months ago
Robust lossless data hiding: Analysis and evaluation
Robust lossless data hiding (LDH) methods have attracted more and more attentions for copyright protection of multimedia in lossy environment. One of the important requirements of...
Lingling An, Xinbo Gao, Cheng Deng, Feng Ji