Sciweavers

1626 search results - page 102 / 326
» The method evaluation model: a theoretical model for validat...
Sort
View
CJ
2004
141views more  CJ 2004»
13 years 8 months ago
Modeling and Analysis of a Scheduled Maintenance System: a DSPN Approach
This paper describes a way to manage the modeling and analysis of Scheduled Maintenance Systems (SMS) within an analytically tractable context. We chose a significant case study h...
Andrea Bondavalli, Roberto Filippini
TII
2011
206views Education» more  TII 2011»
13 years 3 months ago
Timing-Failure Risk Assessment of UML Design Using Time Petri Net Bound Techniques
Abstract—Software systems that do not meet their timing constraints can cause risks. In this work, we propose a comprehensive method for assessing the risk of timing failure by e...
Simona Bernardi, Javier Campos, José Merseg...
TCSV
2008
150views more  TCSV 2008»
13 years 8 months ago
Robust Video Fingerprinting for Content-Based Video Identification
Video fingerprints are feature vectors that uniquely characterize one video clip from another. The goal of video fingerprinting is to identify a given video query in a database (DB...
Sunil Lee, Chang Dong Yoo
IEICET
2007
120views more  IEICET 2007»
13 years 8 months ago
Analysis of Polarization Diversity Gain at Base Station in W-CDMA System
There have been many theoretical and experimental investigations on polarization diversity reception characteristics at base stations. The diversity gain was evaluated based on th...
Masaru Fukushige, Tetsurou Imai
SOUPS
2009
ACM
14 years 2 months ago
Revealing hidden context: improving mental models of personal firewall users
The Windows Vista personal firewall provides its diverse users with a basic interface that hides many operational details. However, concealing the impact of network context on th...
Fahimeh Raja, Kirstie Hawkey, Konstantin Beznosov