Sciweavers

1923 search results - page 223 / 385
» Modeling Complexity in Secure Distributed Computing
Sort
View
OOPSLA
2009
Springer
15 years 4 months ago
Coherent reaction
Side effects are both the essence and bane of imperative programming. The programmer must carefully coordinate actions to manage their side effects upon each other. Such coordinat...
Jonathan Edwards
EDOC
2009
IEEE
15 years 1 months ago
Realizing Correspondences in Multi-viewpoint Specifications
Viewpoint modeling is an effective technique for specifying complex software systems in terms of a set of independent viewpoints and correspondences between them. Each viewpoint f...
José Raúl Romero, Juan Ignacio Jaen,...
ICCV
2009
IEEE
14 years 7 months ago
Real-time visual tracking via Incremental Covariance Tensor Learning
Visual tracking is a challenging problem, as an object may change its appearance due to pose variations, illumination changes, and occlusions. Many algorithms have been proposed t...
Yi Wu, Jian Cheng, Jinqiao Wang, Hanqing Lu
CIKM
2009
Springer
15 years 4 months ago
StereoTrust: a group based personalized trust model
Trust plays important roles in diverse decentralized environments, including our society at large. Computational trust models help to, for instance, guide users’ judgements in o...
Xin Liu, Anwitaman Datta, Krzysztof Rzadca, Ee-Pen...
SPIN
2001
Springer
15 years 2 months ago
Addressing Dynamic Issues of Program Model Checking
Abstract. Model checking real programs has recently become an active research area. Programs however exhibit two characteristics that make model checking di cult: the complexity of...
Flavio Lerda, Willem Visser