Sciweavers

1580 search results - page 37 / 316
» Non-Interference Through Determinism
Sort
View
ECR
2010
126views more  ECR 2010»
13 years 6 months ago
The conceptual model of context for mobile commerce applications
Mobile commerce applications adhering to anytime and anywhere paradigm, required to be flexible. They should be able to adapt their interface, services and content towards a certai...
Poulcheria Benou, Costas Vassilakis
CDC
2010
IEEE
114views Control Systems» more  CDC 2010»
13 years 3 months ago
Sufficient conditions for flocking via graph robustness analysis
In this paper, we consider a multi-agent system consisting of mobile agents with second-order dynamics. The communication network is determined by a standard interaction rule based...
Samuel Martin, Antoine Girard
TDSC
2011
13 years 3 months ago
Reliability for Networked Storage Nodes
High-end enterprise storage has traditionally consisted of monolithic systems with customized hardware, multiple redundant components and paths, and no single point of failure. Di...
K. K. Rao, James Lee Hafner, Richard A. Golding
PAA
2010
13 years 3 months ago
Identification of scripts and orientations of degraded document images
This paper presents a pair of identification technique that automatically detect scripts and orientations of document images suffering from various types of document degradation. ...
Shijian Lu, Linlin Li, Chew Lim Tan
PVLDB
2010
101views more  PVLDB 2010»
13 years 3 months ago
InZeit: Efficiently Identifying Insightful Time Points
Web archives are useful resources to find out about the temporal evolution of persons, organizations, products, or other topics. However, even when advanced text search functional...
Vinay Setty, Srikanta J. Bedathur, Klaus Berberich...