Sciweavers

1477 search results - page 272 / 296
» Token flow control
Sort
View
ICWS
2009
IEEE
13 years 6 months ago
QoS-Driven Adaptation of BPEL Scenario Execution
BPEL/WSBPEL is the predominant approach for combining individual web services into integrated business processes, allowing for the specification of their sequence, control flow an...
Christos Kareliotis, Costas Vassilakis, Stathis Ro...
BWCCA
2010
13 years 3 months ago
Advanced Design Issues for OASIS Network-on-Chip Architecture
Network-on-Chip (NoC) architectures provide a good way of realizing efficient interconnections and largely alleviate the limitations of bus-based solutions. NoC has emerged as a so...
Kenichi Mori, Adam Esch, Abderazek Ben Abdallah, K...
JDCTA
2010
688views more  JDCTA 2010»
13 years 3 months ago
Hand Mouse: Real Time Hand Motion Detection System Based on Analysis of Finger Blobs
Hand detection is a fundamental step in many practical applications as gesture recognition, video surveillance, and multimodal machine interface and so on. The aim of this paper i...
Ibrahim Furkan Ince, Manuel Socarras-Garzon, Tae-C...
MMAS
2010
Springer
13 years 3 months ago
Simplified Modelling of a Thermal Bath, with Application to a Fluid Vortex System
Based on the thermodynamic concept of a reservoir, we investigate a computational model for interaction with unresolved degrees of freedom (a thermal bath). We assume that a finite...
Svetlana Dubinkina, Jason Frank, Ben Leimkuhler
TDSC
2010
172views more  TDSC 2010»
13 years 3 months ago
Proactive Detection of Computer Worms Using Model Checking
Although recent estimates are speaking of 200,000 different viruses, worms, and Trojan horses, the majority of them are variants of previously existing malware. As these variants m...
Johannes Kinder, Stefan Katzenbeisser, Christian S...