Sciweavers

5439 search results - page 993 / 1088
» Patterns: from system design to software testing
Sort
View
HICSS
2005
IEEE
110views Biometrics» more  HICSS 2005»
15 years 3 months ago
A Trust-based Negotiation Mechanism for Decentralized Economic Scheduling
Abstract— This paper presents a decentralized negotiation protocol for cooperative economic scheduling in a supply chain environment. For this purpose we designed autonomous agen...
Tim Stockheim, Oliver Wendt, Michael Schwind
JTRES
2009
ACM
15 years 2 months ago
A technology compatibility kit for safety critical Java
Safety Critical Java is a specification being built on top a subset of interfaces from the Real-Time Specification for Java. It is designed to ease development and analysis of s...
Lei Zhao, Daniel Tang, Jan Vitek
108
Voted
SIGGRAPH
2010
ACM
15 years 2 months ago
Unstructured video-based rendering: interactive exploration of casually captured videos
We present an algorithm designed for navigating around a performance that was filmed as a “casual” multi-view video collection: real-world footage captured on hand held camer...
Luca Ballan, Gabriel J. Brostow, Jens Puwein, Marc...
MEDIAFORENSICS
2010
14 years 11 months ago
Better security levels for broken arrows
This paper considers the security aspect of the robust zero-bit watermarking technique `Broken Arrows'(BA),1 which was invented and tested for the international challenge BOW...
Fuchun Xie, Teddy Furon, Caroline Fontaine
HCI
2007
14 years 11 months ago
Human Communication Based on Icons in Crisis Environments
In recent years, we have developed an icon-based communication interface to represent concepts and ideas. Users can create messages to communicate with others using a spatial arran...
Siska Fitrianie, Dragos Datcu, Léon J. M. R...