Sciweavers

6757 search results - page 1090 / 1352
» Knowledge Analysis on Process Models
Sort
View
135
Voted
ICDAR
2009
IEEE
15 years 1 months ago
Symbol Detection Using Region Adjacency Graphs and Integer Linear Programming
In this paper, we tackle the problem of localizing graphical symbols on complex technical document images by using an original approach to solve the subgraph isomorphism problem. ...
Pierre Le Bodic, Hervé Locteau, Séba...
207
Voted
TII
2011
206views Education» more  TII 2011»
14 years 10 months ago
Timing-Failure Risk Assessment of UML Design Using Time Petri Net Bound Techniques
Abstract—Software systems that do not meet their timing constraints can cause risks. In this work, we propose a comprehensive method for assessing the risk of timing failure by e...
Simona Bernardi, Javier Campos, José Merseg...
107
Voted
JDCTA
2010
172views more  JDCTA 2010»
14 years 10 months ago
Characterizing MEGACO Security in the presence Diameter Server
This paper analyzes performance of MEGACO (Media Gateway Control Protocol) based on Diameter which is an Authentication, Authorization,andAccounting (AAA) protocol developed withi...
Pedram Hajipour, Kolsoom Abbasi Shahkooh
166
Voted
ICDAR
2011
IEEE
14 years 3 months ago
Co-training for Handwritten Word Recognition
—To cope with the tremendous variations of writing styles encountered between different individuals, unconstrained automatic handwriting recognition systems need to be trained on...
Volkmar Frinken, Andreas Fischer, Horst Bunke, Ali...
STACS
2012
Springer
13 years 11 months ago
Stabilization of Branching Queueing Networks
Queueing networks are gaining attraction for the performance analysis of parallel computer systems. A Jackson network is a set of interconnected servers, where the completion of a...
Tomás Brázdil, Stefan Kiefer
« Prev « First page 1090 / 1352 Last » Next »