Sciweavers

1682 search results - page 238 / 337
» Techniques for Automating Distributed Real-Time Applications...
Sort
View
INFOCOM
2006
IEEE
15 years 3 months ago
Trust Evaluation in Anarchy: A Case Study on Autonomous Networks
— With the explosive growth of network techniques, in particular wireless communications, the traditional centralized, fixed networks can no longer satisfy the enormous demands ...
Tao Jiang, John S. Baras
SELMAS
2005
Springer
15 years 3 months ago
A Product-Line Approach to Promote Asset Reuse in Multi-agent Systems
Software reuse technologies have been a driving force in significantly reducing both the time and cost of software specification, development, maintenance and evolution. However, t...
Josh Dehlinger, Robyn R. Lutz
PVLDB
2010
134views more  PVLDB 2010»
14 years 8 months ago
Conditioning and Aggregating Uncertain Data Streams: Going Beyond Expectations
Uncertain data streams are increasingly common in real-world deployments and monitoring applications require the evaluation of complex queries on such streams. In this paper, we c...
Thanh T. L. Tran, Andrew McGregor, Yanlei Diao, Li...
ICPR
2006
IEEE
15 years 11 months ago
Adaptive Discriminant Projection for Content-based Image Retrieval
Content-based Image Retrieval (CBIR) is a computer vision application that aims at automatically retrieving images based on their visual content. Linear Discriminat Analysis and i...
Jie Yu, Qi Tian
CAV
2011
Springer
253views Hardware» more  CAV 2011»
14 years 1 months ago
HAMPI: A String Solver for Testing, Analysis and Vulnerability Detection
Abstract. Many automatic testing, analysis, and verification techniques for programs can effectively be reduced to a constraint-generation phase followed by a constraint-solving ...
Vijay Ganesh, Adam Kiezun, Shay Artzi, Philip J. G...