Sciweavers

1053 search results - page 148 / 211
» The Rules of Virtual Groups
Sort
View
APNOMS
2009
Springer
15 years 5 months ago
Bypassing Routing Holes in WSNs with a Predictive Geographic Greedy Forwarding
Applications in wireless sensor networks (WSNs) experience the routing hole problem. That is, the current node cannot forward to the destination, although it is the closest node, b...
Minh Thiep Ha, Priyadharshini Sakthivel, Hyunseung...
ICMI
2009
Springer
147views Biometrics» more  ICMI 2009»
15 years 5 months ago
Multimodal end-of-turn prediction in multi-party meetings
One of many skills required to engage properly in a conversation is to know the appropiate use of the rules of engagement. In order to engage properly in a conversation, a virtual...
Iwan de Kok, Dirk Heylen
ICMT
2009
Springer
15 years 5 months ago
Automatic Model Generation Strategies for Model Transformation Testing
Testing model transformations requires input models which are graphs of inter-connected objects that must conform to a meta-model and meta-constraints from heterogeneous sources su...
Sagar Sen, Benoit Baudry, Jean-Marie Mottu
SBMF
2009
Springer
105views Formal Methods» more  SBMF 2009»
15 years 5 months ago
Verifying Compiled File System Code
Abstract. This paper presents a case study on retrospective verication of the Linux Virtual File System (VFS), which is aimed at checking for violations of API usage rules and mem...
Jan Tobias Mühlberg, Gerald Lüttgen
IEEESCC
2008
IEEE
15 years 5 months ago
Using Semantics for Resource Allocation in Computing Service Providers
Service providers (SP) business goals require an efficient management of their computational resources in order to perform provisioning, deployment, execution and adaptation whic...
Jorge Ejarque, Marc de Palol, Iñigo Goiri, ...