Sciweavers

4781 search results - page 624 / 957
» Complexity at large
Sort
View
141
Voted
TASE
2008
IEEE
15 years 11 months ago
Bounded Model Checking of Compositional Processes
Verification techniques like SAT-based bounded model checking have been successfully applied to a variety of system models. Applying bounded model checking to compositional proce...
Jun Sun 0001, Yang Liu 0003, Jin Song Dong, Jing S...
VTC
2008
IEEE
15 years 11 months ago
Transmission Strategies for Parallel Relay Networks Based on Superposition Coding
—This paper is concerned with the transmission strategies and relay selection for decode-and-forward parallel relay networks (PRNs) based on superposition coding. Our focus is on...
Jianzhong Huang 0002, Yang Yang, Xinmei Wang, Peng...
ADC
2008
Springer
139views Database» more  ADC 2008»
15 years 11 months ago
Computing Structural Similarity of Source XML Schemas against Domain XML Schema
In this paper, we study the problem of measuring structural similarities of large number of source schemas against a single domain schema, which is useful for enhancing the qualit...
Jianxin Li, Chengfei Liu, Jeffrey Xu Yu, Jixue Liu...
AVSS
2007
IEEE
15 years 11 months ago
Real-time detection of illegally parked vehicles using 1-D transformation
With decreasing costs of high quality surveillance systems, human activity detection and tracking has become increasingly practical. Accordingly, automated systems have been desig...
Jong Taek Lee, Michael S. Ryoo, Matthew Riley, Jak...
BDIM
2007
IEEE
99views Business» more  BDIM 2007»
15 years 11 months ago
Model-Based Mitigation of Availability Risks
The assessment and mitigation of risks related to the availability of the IT infrastructure is becoming increasingly important in modern organizations. Unfortunately, present stan...
Emmanuele Zambon, Damiano Bolzoni, Sandro Etalle, ...