Sciweavers

4636 search results - page 149 / 928
» Modelling and Validation with VipTool
Sort
View
COMCOM
2002
84views more  COMCOM 2002»
13 years 7 months ago
An implementation for ATM Adaptation Layer 5
IP over ATM technique is gaining popularity due to the Quality of Service (QoS) and other management features offered by ATM and its ease of integration with almost all existing t...
Mohammad S. Obaidat, V. Cassod
ECCC
2000
117views more  ECCC 2000»
13 years 7 months ago
On Testing Expansion in Bounded-Degree Graphs
We consider testing graph expansion in the bounded-degree graph model. Specifically, we refer to algorithms for testing whether the graph has a second eigenvalue bounded above by a...
Oded Goldreich, Dana Ron
ENTCS
2002
91views more  ENTCS 2002»
13 years 7 months ago
Petri nets with causal time for system verification
We present a new approach to the modelling of time constrained systems. It is based on untimed high-level Petri nets using the concept of causal time. With this concept, the progr...
Cécile Bui Thanh, Hanna Klaudel, Franck Pom...
NPL
2000
95views more  NPL 2000»
13 years 7 months ago
Bayesian Sampling and Ensemble Learning in Generative Topographic Mapping
Generative topographic mapping (GTM) is a statistical model to extract a hidden smooth manifold from data, like the self-organizing map (SOM). Although a deterministic search algo...
Akio Utsugi
ICPR
2010
IEEE
13 years 7 months ago
Robust Figure Extraction on Textured Background: A Game-Theoretic Approach
Feature-based image matching relies on the assumption that the features contained in the model are distinctive enough. When both model and data present a sizeable amount of clutte...
Andrea Albarelli, Emanuele Rodolà, Alberto Cavall...