Sciweavers

4887 search results - page 613 / 978
» System Level Design Using C
Sort
View
170
Voted
ACMICEC
2003
ACM
144views ECommerce» more  ACMICEC 2003»
15 years 10 months ago
Security model for a multi-agent marketplace
A multi-agent marketplace, MAGNET (Multi AGent Negotiation Testbed), is a promising solution to conduct online combinatorial auctions. The trust model of MAGNET is somewhat diffe...
Ashutosh Jaiswal, Yongdae Kim, Maria L. Gini
135
Voted
TASE
2008
IEEE
15 years 4 months ago
Lean Buffering in Serial Production Lines With Nonidentical Exponential Machines
Lean buffering is the smallest buffer capacity, which is necessary and sufficient to ensure the desired production rate of a manufacturing system. Literature offers methods for des...
Shu-Yin Chiang, Alexander Hu, Semyon M. Meerkov
149
Voted
ICDAR
2009
IEEE
15 years 11 months ago
Impact of Alphabet Knowledge on Online Writer Identification
Character prototype approaches for writer identification produces a consistent set of templates that are used to model the handwriting styles of writers, thereby allowing high acc...
Guo Xian Tan, Christian Viard-Gaudin, Alex C. Kot
194
Voted
MIR
2004
ACM
242views Multimedia» more  MIR 2004»
15 years 10 months ago
Content based access for a massive database of human observation video
We present in this paper a CBIR system for use in a psychological study of the relationship between human movement and Dyslexia. The system allows access to up to 500 hours of vid...
Laurent Joyeux, Erika Doyle, Hugh Denman, Andrew C...
135
Voted
IMF
2007
15 years 6 months ago
Testing Forensic Hash Tools on Sparse Files
: Forensic hash tools are usually used to prove and protect the integrity of digital evidence: When a file is intercepted by law enforcement, a cryprographic fingerprint is taken...
Harish Daiya, Maximillian Dornseif, Felix C. Freil...