Sciweavers

1639 search results - page 260 / 328
» Degree-constrained network flows
Sort
View
DATE
2004
IEEE
129views Hardware» more  DATE 2004»
15 years 4 months ago
On the Design and Verification Methodology of the Look-Aside Interface
In this paper, we present a technique to design and verify the Look-Aside (LA-1) Interface standard used in network processors. Our design flow includes several refinements starti...
Ali Habibi, Asif Iqbal Ahmed, Otmane Aït Moha...
133
Voted
ISN
2000
Springer
158views Communications» more  ISN 2000»
15 years 4 months ago
Load Balancing for a Distributed CORBA-Based SCP
This paper examines load balancing issues relating to a distributed CORBA-based Service Control Point. Two types of load balancing strategies are explored through simulation studie...
Conor McArdle, Niklas Widell, Christian Nyberg, Er...
FORTE
2008
15 years 2 months ago
Checking Correctness of Transactional Behaviors
Abstract. The Signal Calculus is an asynchronous process calculus featuring multicast communication. It relies on explicit modeling of the communication structure of the network (c...
Vincenzo Ciancia, Gian Luigi Ferrari, Roberto Guan...
89
Voted
ICMLA
2008
15 years 2 months ago
Probabilistic Exploitation of the Lucas and Kanade Smoothness Constraint
The basic idea of Lucas and Kanade is to constrain the local motion measurement by assuming a constant velocity within a spatial neighborhood. We reformulate this spatial constrai...
Volker Willert, Julian Eggert, Marc Toussaint, Edg...
88
Voted
SOCRATES
2008
105views Education» more  SOCRATES 2008»
15 years 2 months ago
Laboratory Door Opens to Non-formal Learning Communities. Science Centres as Mediators
The e-KNOWNET is a Lifelong Learning project, which aims to develop an innovative and viable mechanism to facilitate the flow of new scientific knowledge produced in the research ...
G. Anyfandi, V. Laopodis, V. Koulaidis, Nicolas Ap...