Sciweavers

4636 search results - page 849 / 928
» Application of Linguistic Techniques for Use Case Analysis
Sort
View
77
Voted
JCIT
2008
78views more  JCIT 2008»
14 years 10 months ago
A Study on Web Caching based on Reference Characteristics of Web Objects
There are various web caching replacement algorithms related to reference characteristics of web objects were researched. They could be used in regard to user characteristics of c...
Yun Ji Na, Sarvar R. Abdullaev, Il Seok Ko
94
Voted
SIAMJO
2008
114views more  SIAMJO 2008»
14 years 10 months ago
An Inexact SQP Method for Equality Constrained Optimization
We present an algorithm for large-scale equality constrained optimization. The method is based on a characterization of inexact sequential quadratic programming (SQP) steps that ca...
Richard H. Byrd, Frank E. Curtis, Jorge Nocedal
IJRR
2007
335views more  IJRR 2007»
14 years 10 months ago
Homography-based 2D Visual Tracking and Servoing
The objective of this paper is to propose a new homography-based approach to image-based visual tracking and servoing. The visual tracking algorithm proposed in the paper is based...
Selim Benhimane, Ezio Malis
TIFS
2008
145views more  TIFS 2008»
14 years 10 months ago
Physical-Layer Authentication
Authentication is the process where claims of identity are verified. Most mechanisms of authentication (e.g., digital signatures and certificates) exist above the physical layer, t...
Paul L. Yu, John S. Baras, Brian M. Sadler
111
Voted
TII
2008
98views more  TII 2008»
14 years 10 months ago
Formal Methods for Systems Engineering Behavior Models
Abstract--Safety analysis in Systems Engineering (SE) processes, as usually implemented, rarely relies on formal methods such as model checking since such techniques, however power...
Charlotte Seidner, Olivier H. Roux