Sciweavers

26354 search results - page 5139 / 5271
» How we refactor, and how we know it
Sort
View
ENTCS
2007
113views more  ENTCS 2007»
15 years 1 months ago
Modular Checkpointing for Atomicity
Transient faults that arise in large-scale software systems can often be repaired by re-executing the code in which they occur. Ascribing a meaningful semantics for safe re-execut...
Lukasz Ziarek, Philip Schatz, Suresh Jagannathan
EOR
2007
198views more  EOR 2007»
15 years 1 months ago
Airline crew scheduling from planning to operations
Crew scheduling problems at the planning level are typically solved in two steps: first, creating working patterns, and then assigning these to individual crew. The first step is ...
Claude P. Medard, Nidhi Sawhney
NETWORK
2008
139views more  NETWORK 2008»
15 years 1 months ago
Composing semantic services in open sensor-rich environments
Consider a scenario where Jane is at an airport. She wants to find a restaurant with healthy food and short waiting time on the way to her terminal. The airport can provide such s...
Jie Liu, Feng Zhao
NN
2006
Springer
122views Neural Networks» more  NN 2006»
15 years 1 months ago
Goals and means in action observation: A computational approach
Many of our daily activities are supported by behavioural goals that guide the selection of actions, which allow us to reach these goals effectively. Goals are considered to be im...
Raymond H. Cuijpers, Hein T. van Schie, Mathieu Ko...
PAMI
2006
186views more  PAMI 2006»
15 years 1 months ago
Performance Evaluation of Fingerprint Verification Systems
This paper is concerned with the performance evaluation of fingerprint verification systems. After an initial classification of biometric testing initiatives, we explore both the t...
Raffaele Cappelli, Dario Maio, Davide Maltoni, Jam...
« Prev « First page 5139 / 5271 Last » Next »