Sciweavers

1078 search results - page 109 / 216
» Modelling and Verifying of e-Commerce Systems
Sort
View
FORMATS
2004
Springer
15 years 9 months ago
Lazy Approximation for Dense Real-Time Systems
We propose an effective and complete method for verifying safety and properties of timed systems, which is based on predicate abstraction for g finite abstractions of timed autom...
Maria Sorea
CIA
2003
Springer
15 years 9 months ago
A Peer-to-Peer Approach to Resource Discovery in Multi-agent Systems
A multi-agent system is a network of software agents that cooperate to solve problems. In open multi-agent systems, the agents that need resources provided by other agents are not ...
Vassilios V. Dimakopoulos, Evaggelia Pitoura
CLEAR
2006
Springer
190views Biometrics» more  CLEAR 2006»
15 years 8 months ago
Evaluation of USC Human Tracking System for Surveillance Videos
The evaluation results of a system for tracking humans in surveillance videos are presented. Moving blobs are detected based on adaptive background modeling. A shape based multi-vi...
Bo Wu, Xuefeng Song, Vivek Kumar Singh, Ram Nevati...
IH
1999
Springer
15 years 8 months ago
On the Design of a Watermarking System: Considerations and Rationales
This paper summarizes considerations and rationales for the design of a watermark detector. In particular, we relate watermark detection to the problem of signal detection in the p...
Jean-Paul M. G. Linnartz, Geert Depovere, Ton Kalk...
COMSWARE
2006
IEEE
15 years 8 months ago
A measurement study of the Linux TCP/IP stack performance and scalability on SMP systems
The performance of the protocol stack implementation of an operating system can greatly impact the performance of networked applications that run on it. In this paper, we present a...
Shourya P. Bhattacharya, Varsha Apte