Sciweavers

4636 search results - page 729 / 928
» Modelling and Validation with VipTool
Sort
View
CORR
2010
Springer
127views Education» more  CORR 2010»
13 years 9 months ago
Profile Based Sub-Image Search in Image Databases
Sub-image search with high accuracy in natural images still remains a challenging problem. This paper proposes a new feature vector called profile for a keypoint in a bag of visual...
Vishwakarma Singh, Ambuj K. Singh
CORR
2008
Springer
154views Education» more  CORR 2008»
13 years 9 months ago
A Counterexample Guided Abstraction-Refinement Framework for Markov Decision Processes
rexample Guided Abstraction-Refinement Framework for Markov Decision Processes ROHIT CHADHA and MAHESH VISWANATHAN Dept. of Computer Science, University of Illinois at Urbana-Champ...
Rohit Chadha, Mahesh Viswanathan
EAAI
2008
116views more  EAAI 2008»
13 years 9 months ago
Robust neuro-identification of nonlinear plants in electric power systems with missing sensor measurements
Fault tolerant measurements are an essential requirement for system identification, control and protection. Measurements can be corrupted or interrupted due to sensor failure, bro...
Wei Qiao, Zhi Gao, Ronald G. Harley, Ganesh K. Ven...
CCR
2006
148views more  CCR 2006»
13 years 9 months ago
NetScale: scalable time-stepped hybrid simulation of large IP networks
This paper presents a scalable time-stepped hybrid simulation algorithm which is well adapted to the simulation of large IP networks (up to one million of competing flows and netw...
Laurent Fournié, Dohy Hong, Florent Perisse
CORR
2006
Springer
114views Education» more  CORR 2006»
13 years 9 months ago
Peer to Peer Networks for Defense Against Internet Worms
Abstract-- Internet worms, which spread in computer networks without human mediation, pose a severe threat to computer systems today. The rate of propagation of worms has been meas...
Srinivas Shakkottai, R. Srikant