Sciweavers

4072 search results - page 730 / 815
» Designing an Optimal Network Using the Cross-Entropy Method
Sort
View
INFOCOM
2009
IEEE
15 years 6 months ago
PHY Aided MAC - A New Paradigm
—Network protocols have traditionally been designed using a layered method in part because it is easier to implement some portions of network protocols in software and other port...
Dola Saha, Aveek Dutta, Dirk Grunwald, Douglas C. ...
ATVA
2007
Springer
136views Hardware» more  ATVA 2007»
15 years 5 months ago
Symbolic Fault Tree Analysis for Reactive Systems
Fault tree analysis is a traditional and well-established technique for analyzing system design and robustness. Its purpose is to identify sets of basic events, called cut sets, wh...
Marco Bozzano, Alessandro Cimatti, Francesco Tappa...
AMFG
2003
IEEE
168views Biometrics» more  AMFG 2003»
15 years 2 months ago
Efficient Active Appearance Model for Real-Time Head and Facial Feature Tracking
This paper addresses the 3D tracking of pose and animation of the human face in monocular image sequences using Active Appearance Models. The classical appearancebased tracking su...
Fadi Dornaika, Jörgen Ahlberg
TLDI
2009
ACM
142views Formal Methods» more  TLDI 2009»
15 years 8 months ago
Static extraction of sound hierarchical runtime object graphs
For many object-oriented systems, it is often useful to have a runtime architecture that shows networks of communicating objects. But it is hard to statically extract runtime obje...
Marwan Abi-Antoun, Jonathan Aldrich
INFOCOM
2005
IEEE
15 years 4 months ago
Pricing differentiated Internet services
— One of the critical challenges facing the networking industry today is to increase the profitability of Internet services. One well-known method in economics for increasing th...
Linhai He, Jean C. Walrand