Sciweavers

2373 search results - page 346 / 475
» Modelling Facial Behaviours
Sort
View
WICSA
2004
15 years 5 months ago
An Architectural Approach to Mobility - The Handover Case Study
COMMUNITY is a formal approach to software architecture. Its main characteristics are: a precise, yet intuitive mathematical semantics based on categorical diagrams; a clear separ...
Cristóvão Oliveira, Michel Wermeling...
130
Voted
ACTA
2006
108views more  ACTA 2006»
15 years 4 months ago
Refinement verification of the lazy caching algorithm
The lazy caching algorithm of Afek, Brown, and Merrit (1993) is a protocol that allows the use of local caches with delayed updates. It results in a memory model that is not atomi...
Wim H. Hesselink
AMC
2006
91views more  AMC 2006»
15 years 4 months ago
Lateral load estimation from visco-plastic mud-flow around cylindrical row of piles
In this paper, the influence of slow and creeping flow of mud/slurry is modelled as a visco-plastic fluid around cylindrical row of piles. The study is carried out theoretically u...
Seyhan Firat, Mehmet Saribiyik, Erkan Çeleb...
TCS
2008
15 years 4 months ago
Temporal constraints in the logical analysis of regulatory networks
Starting from the logical description of gene regulatory networks developed by R. Thomas, we introduce an enhanced modelling approach based on timed automata. We obtain a refined ...
Heike Siebert, Alexander Bockmayr
COMCOM
2002
189views more  COMCOM 2002»
15 years 4 months ago
Intrusion detection techniques and approaches
Recent security incidents and analysis have demonstrated that manual response to such attacks is no longer feasible. Intrusion Detection systems offer techniques for modelling and...
Theuns Verwoerd, Ray Hunt