Sciweavers

3199 search results - page 82 / 640
» Variability in Automation System Models
Sort
View
ECCV
2008
Springer
14 years 12 months ago
Automated Delineation of Dendritic Networks in Noisy Image Stacks
We present a novel approach to 3D delineation of dendritic networks in noisy image stacks. We achieve a level of automation beyond that of stateof-the-art systems, which model dend...
Germán González, François Fle...
AAAI
2008
14 years 12 days ago
Resource Constrained Distributed Constraint Optimization with Virtual Variables
Cooperative problem solving with resource constraints are important in practical multi-agent systems. Resource constraints are necessary to handle practical problems including dis...
Toshihiro Matsui, Hiroshi Matsuo, Marius Silaghi, ...
TON
2002
76views more  TON 2002»
13 years 9 months ago
Some properties of variable length packet shapers
The min-plus theory of greedy shapers has been developed after Cruz's results on the calculus of network delays. An example of greedy shaper is the buffered leaky bucket cont...
Jean-Yves Le Boudec
PAMI
2007
97views more  PAMI 2007»
13 years 9 months ago
Statistical Performance Evaluation of Biometric Authentication Systems Using Random Effects Models
As biometric authentication systems become more prevalent, it is becoming increasingly important to evaluate their performance. The current paper introduces a novel statistical me...
Sinjini Mitra, Marios Savvides, Anthony Brockwell
ECOOP
2005
Springer
14 years 3 months ago
Interprocedural Analysis for Privileged Code Placement and Tainted Variable Detection
In Java 2 and Microsoft .NET Common Language Runtime (CLR), trusted code has often been programmed to perform accessrestricted operations not explicitly requested by its untrusted ...
Marco Pistoia, Robert J. Flynn, Larry Koved, Vugra...