Sciweavers

1078 search results - page 158 / 216
» Modelling and Verifying of e-Commerce Systems
Sort
View
ARGMAS
2008
Springer
15 years 6 months ago
Command Dialogues
Verification that agent communication protocols have desirable properties or do not have undesirable properties is an important issue in agent systems where agents intend to commu...
Katie Atkinson, Roderic A. Girle, Peter McBurney, ...
AUTOMATICA
2006
122views more  AUTOMATICA 2006»
15 years 4 months ago
Gibbs sampler-based coordination of autonomous swarms
In this paper a novel, Gibbs sampler-based algorithm is proposed for coordination of autonomous swarms. The swarm is modeled as a Markov random field (MRF) on a graph with a time-...
Wei Xi, Xiaobo Tan, John S. Baras
COMPSEC
2010
142views more  COMPSEC 2010»
15 years 1 months ago
Provably correct Java implementations of Spi Calculus security protocols specifications
Spi Calculus is an untyped high level modeling language for security protocols, used for formal protocols specification and verification. In this paper, a type system for the Spi ...
Alfredo Pironti, Riccardo Sisto
ICASSP
2011
IEEE
14 years 8 months ago
Motion vector recovery with Gaussian Process Regression
In this paper, we propose a Gaussian Process Regression (GPR) framework for concealment of corrupted motion vectors in predictive video coding of packet video systems. The problem...
Hadi Asheri, Abdolkhalegh Bayati, Hamid R. Rabiee,...
IJCNN
2008
IEEE
15 years 11 months ago
A connection-limited neural network by InfoMax and InfoMin
— It is well known that edge filters in the visual system can be generated by the InfoMax principle. But, such models are nonlinear and employ fully-connected network structures...
Yoshitatsu Matsuda, Kazunori Yamaguchi