Sciweavers

3555 search results - page 577 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
114
Voted
ICC
2007
IEEE
124views Communications» more  ICC 2007»
15 years 8 months ago
Optimal Scheduling Policy Determination for High Speed Downlink Packet Access
— In this paper, we present an analytic model and methodology to determine optimal scheduling policy that involves two dimension space allocation: time and code, in High Speed Do...
Hussein Al-Zubaidy, Jerome Talim, Ioannis Lambadar...
MATES
2010
Springer
15 years 9 hour ago
Unifying Agent and Component Concepts: Jadex Active Components
The construction of distributed applications is a challenging task due to inherent system properties like message passing and concurrency. Current technology trends further increas...
Alexander Pokahr, Lars Braubach, Kai Jander
MICAI
2000
Springer
15 years 5 months ago
Eigenfaces Versus Eigeneyes: First Steps Toward Performance Assessment of Representations for Face Recognition
The Principal Components Analysis (PCA) is one of the most successfull techniques that have been used to recognize faces in images. This technique consists of extracting the eigenv...
Teófilo Emídio de Campos, Rogé...
ECCV
2002
Springer
16 years 3 months ago
Estimation of Multiple Illuminants from a Single Image of Arbitrary Known Geometry
We present a new method for the detection and estimation of multiple illuminants, using one image of any object with known geometry and Lambertian reflectance. Our method obviates ...
Yang Wang, Dimitris Samaras
ICDCS
2003
IEEE
15 years 6 months ago
Effective Delay Control for High Rate Heterogeneous Real-time Flows
This paper presents a new method to control the delay performance for high rate heterogeneous real-time traffic flows based on a novel traffic control algorithm which is a gene...
Weijia Jia, Hanxing Wang, Maoning Tang, Wei Zhao