Sciweavers

3318 search results - page 147 / 664
» The Weak Instance Model
Sort
View
116
Voted
SIAMADS
2010
105views more  SIAMADS 2010»
14 years 9 months ago
Nonlinear Patterns in Urban Crime: Hotspots, Bifurcations, and Suppression
We present a weakly nonlinear analysis of our recently developed model for the formation of crime patterns. Using a perturbative approach, we find amplitude equations that govern t...
Martin B. Short, Andrea L. Bertozzi, P. J. Brantin...
104
Voted
AGENTS
2000
Springer
15 years 6 months ago
From one virtual actor to virtual crowds: requirements and constraints
A crowd is not only a group of many individuals. Crowd modelling involves problems that arise only when we focus on crowds. For instance, avoiding collision problems related to a ...
Soraia Raupp Musse, Daniel Thalmann
152
Voted
DDECS
2009
IEEE
202views Hardware» more  DDECS 2009»
15 years 9 months ago
Asynchronous two-level logic of reduced cost
— We propose a novel synthesis method of a dual-rail asynchronous two-level logic of reduced cost. It is based on a model that operates under so called modified weak constraints....
Igor Lemberski, Petr Fiser
111
Voted
ICPR
2008
IEEE
15 years 9 months ago
Top down image segmentation using congealing and graph-cut
This paper develops a weakly supervised algorithm that learns to segment rigid multi-colored objects from a set of training images and key points. The approach uses congealing to ...
Douglas Moore, John Stevens, Scott Lundberg, Bruce...
145
Voted
NCA
2008
IEEE
15 years 9 months ago
On the Application of Formal Methods for Specifying and Verifying Distributed Protocols
In this paper we consider the frameworks of Process Algebra and I/O Automata and we apply both towards the verification of a distributed leader-election protocol. Based on the tw...
Marina Gelastou, Chryssis Georgiou, Anna Philippou