Sciweavers

5544 search results - page 253 / 1109
» Three Inadequate Models
Sort
View
110
Voted
IPPS
2008
IEEE
15 years 9 months ago
Modeling and analysis of power in multicore network processors
With the emergence of multicore network processors in support of high-performance computing and networking applications, power consumption has become a problem of increasing signi...
S. Huang, Y. Luo, W. Feng
109
Voted
ROMAN
2007
IEEE
134views Robotics» more  ROMAN 2007»
15 years 9 months ago
Shaping Naive Users' Models of Robots' Situation Awareness
Abstract—This paper addresses a so far neglected area of human-robot interaction by approaching situation awareness from the point of view of naïve users. In particular, we pres...
Kerstin Fischer, M. Lohse
141
Voted
BPM
2007
Springer
201views Business» more  BPM 2007»
15 years 8 months ago
Towards Formal Analysis of Artifact-Centric Business Process Models
Abstract. Business process (BP) modeling is a building block for design and management of business processes. Two fundamental aspects of BP modeling are: a formal framework that we...
Kamal Bhattacharya, Cagdas Evren Gerede, Richard H...
116
Voted
AIIA
2005
Springer
15 years 8 months ago
Experimental Evaluation of Hierarchical Hidden Markov Models
Building profiles for processes and for interactive users is a important task in intrusion detection. This paper presents the results obtained with a Hierarchical Hidden Markov Mo...
Attilio Giordana, Ugo Galassi, Lorenza Saitta
128
Voted
CBSE
2005
Springer
15 years 8 months ago
A Component-Oriented Model for the Design of Safe Multi-threaded Applications
We previously developed a component-oriented model that combines ideas from self-organizing architectures and from design by contract to address the complexity of design in multi-t...
Reimer Behrends, R. E. Kurt Stirewalt, Laura K. Di...