Sciweavers

2468 search results - page 461 / 494
» On Model Checking Techniques for Randomized Distributed Syst...
Sort
View
DATE
2004
IEEE
143views Hardware» more  DATE 2004»
15 years 7 months ago
Fault-Tolerant Deployment of Embedded Software for Cost-Sensitive Real-Time Feedback-Control Applications
Designing cost-sensitive real-time control systems for safetycritical applications requires a careful analysis of the cost/coverage trade-offs of fault-tolerant solutions. This fu...
Claudio Pinello, Luca P. Carloni, Alberto L. Sangi...
ACMACE
2008
ACM
15 years 5 months ago
Shadow agent: a new type of virtual agent
The shadow agent is a new type of intelligent virtual agent exploiting the metaphor of the shadow as a medium. The core of the shadow agent is a behavioral architecture inspired b...
Philippe Pasquier, Eunjung Han, Kirak Kim, Keechul...
EMNLP
2004
15 years 4 months ago
Unsupervised Domain Relevance Estimation for Word Sense Disambiguation
This paper presents Domain Relevance Estimation (DRE), a fully unsupervised text categorization technique based on the statistical estimation of the relevance of a text with respe...
Alfio Massimiliano Gliozzo, Bernardo Magnini, Carl...
SIAMSC
2008
116views more  SIAMSC 2008»
15 years 3 months ago
A New Asymptotic Preserving Scheme Based on Micro-Macro Formulation for Linear Kinetic Equations in the Diffusion Limit
We propose a new numerical scheme for linear transport equations. It is based on a decomposition of the distribution function into equilibrium and non-equilibrium parts. We also us...
Mohammed Lemou, Luc Mieussens
TDP
2010
189views more  TDP 2010»
14 years 10 months ago
The PROBE Framework for the Personalized Cloaking of Private Locations
The widespread adoption of location-based services (LBS) raises increasing concerns for the protection of personal location information. A common strategy, referred to as obfuscati...
Maria Luisa Damiani, Elisa Bertino, Claudio Silves...