Sciweavers

2357 search results - page 131 / 472
» Computing Refactorings of Behavior Models
Sort
View
CVPR
2010
IEEE
15 years 3 months ago
Anomaly detection in crowded scenes
A novel framework for anomaly detection in crowded scenes is presented. Three properties are identified as important for the design of a localized video representation suitable f...
Vijay Mahadevan, Weixin Li, Viral Bhalodia, Nuno V...
JSSPP
2005
Springer
15 years 8 months ago
Modeling User Runtime Estimates
User estimates of job runtimes have emerged as an important component of the workload on parallel machines, and can have a significant impact on how a scheduler treats different ...
Dan Tsafrir, Yoav Etsion, Dror G. Feitelson
110
Voted
SAFECOMP
2001
Springer
15 years 7 months ago
An Investigation on Mutation Strategies for Fault Injection into RDD-100 Models
This paper focuses on the development of a conceptual framework for integrating fault injection mechanisms into the RDD-100 tool2 to support the dependability analysis of computer...
Mohamed Kaâniche, Yannick Le Guédart,...
114
Voted
CORR
2010
Springer
166views Education» more  CORR 2010»
15 years 3 months ago
Bandwidth Modeling and Estimation in Peer to Peer Networks
Recent studies have shown that the majority of today's internet traffic is related to Peer to Peer (P2P) traffic. The study of bandwidth in P2P networks is very important. Bec...
Kiarash Mizanian, Mehdi Vasef, Morteza Analoui
SOCIALCOM
2010
14 years 9 months ago
The Swarm Model in Open Source Software Developer Communities
Most of the current swarm model studies and applications try to mimic the collective behaviors of social animals, such as birds and ants. The studies seek to solve tasks similar to...
Xiaohui Cui, Justin M. Beaver, Everett Stiles, Lau...