Sciweavers

7918 search results - page 1231 / 1584
» Model Composition Directives
Sort
View
PE
2002
Springer
137views Optimization» more  PE 2002»
15 years 4 months ago
Analysis of two competing TCP/IP connections
Many mathematical models exist for describing the behavior of TCP/IP (TCP: transmission control protocol) under an exogenous loss process that does not depend on the window size. ...
Eitan Altman, Tania Jiménez, R. Nú&n...
RAS
1998
81views more  RAS 1998»
15 years 4 months ago
Towards a theory of delegation for agent-based systems
In this paper a theory of delegation is presented. There are at least three reasons for developing such a theory. First, one of the most relevant notions of "agent" is b...
Cristiano Castelfranchi, Rino Falcone
122
Voted
SOPR
1998
117views more  SOPR 1998»
15 years 4 months ago
Towards mature IT services
Many organizations provide information technology services, either to external or internal customers. They maintain software, operate information systems, manage and maintain work...
Frank Niessink, Hans van Vliet
TMM
2002
91views more  TMM 2002»
15 years 4 months ago
Power-spectrum condition for energy-efficient watermarking
This paper presents a model for watermarking and some attacks on watermarks. Given the watermarked signal, the so-called Wiener attack performs minimum mean-squared error (MMSE) es...
Jonathan K. Su, Bernd Girod
TOG
2002
123views more  TOG 2002»
15 years 4 months ago
A user interface for interactive cinematic shadow design
Placing shadows is difficult task since shadows depend on the relative positions of lights and objects in an unintuitive manner. To simplify the task of the modeler, we present a ...
Fabio Pellacini, Parag Tole, Donald P. Greenberg
« Prev « First page 1231 / 1584 Last » Next »