Sciweavers

3318 search results - page 147 / 664
» The Weak Instance Model
Sort
View
SIAMADS
2010
105views more  SIAMADS 2010»
13 years 2 months ago
Nonlinear Patterns in Urban Crime: Hotspots, Bifurcations, and Suppression
We present a weakly nonlinear analysis of our recently developed model for the formation of crime patterns. Using a perturbative approach, we find amplitude equations that govern t...
Martin B. Short, Andrea L. Bertozzi, P. J. Brantin...
AGENTS
2000
Springer
13 years 11 months ago
From one virtual actor to virtual crowds: requirements and constraints
A crowd is not only a group of many individuals. Crowd modelling involves problems that arise only when we focus on crowds. For instance, avoiding collision problems related to a ...
Soraia Raupp Musse, Daniel Thalmann
DDECS
2009
IEEE
202views Hardware» more  DDECS 2009»
14 years 2 months ago
Asynchronous two-level logic of reduced cost
— We propose a novel synthesis method of a dual-rail asynchronous two-level logic of reduced cost. It is based on a model that operates under so called modified weak constraints....
Igor Lemberski, Petr Fiser
ICPR
2008
IEEE
14 years 2 months ago
Top down image segmentation using congealing and graph-cut
This paper develops a weakly supervised algorithm that learns to segment rigid multi-colored objects from a set of training images and key points. The approach uses congealing to ...
Douglas Moore, John Stevens, Scott Lundberg, Bruce...
NCA
2008
IEEE
14 years 2 months ago
On the Application of Formal Methods for Specifying and Verifying Distributed Protocols
In this paper we consider the frameworks of Process Algebra and I/O Automata and we apply both towards the verification of a distributed leader-election protocol. Based on the tw...
Marina Gelastou, Chryssis Georgiou, Anna Philippou