Sciweavers

5544 search results - page 867 / 1109
» Three Inadequate Models
Sort
View
CVPR
2010
IEEE
15 years 8 months ago
Person Re-Identification by Symmetry-Driven Accumulation of Local Features
In this paper, we present an appearance-based method for person re-identification. It consists in the extraction of features that model three complementary aspects of the human ap...
Michela Farenzena, Loris Bazzani, Alessandro Perin...
137
Voted
CSMR
1999
IEEE
15 years 8 months ago
Employing Use-cases and Domain Knowledge for Comprehending Resource Usage
Philips Electronics is a world wide electronics company that develops many products containing embedded software. These products range from shavers with only few hundred bytes of ...
René L. Krikhaar, Maarten Pennings, J. Zonn...
141
Voted
SIGMETRICS
1999
ACM
15 years 8 months ago
On the Use of Trace Sampling for Architectural Studies of Desktop Applications
This paper examines the feasibility of performing architectural studies with trace sampling for a suite of desktop application traces on Windows NT. This paper makes three contrib...
Patrick Crowley, Jean-Loup Baer
148
Voted
ICECCS
1999
IEEE
140views Hardware» more  ICECCS 1999»
15 years 8 months ago
Practical Considerations in Protocol Verification: The E-2C Case Study
We report on our efforts to formally specify and verify a new protocol of the E-2C Hawkeye Early Warning Aircraft. The protocol, which is currently in test at Northrop Grumman, su...
Yifei Dong, Scott A. Smolka, Eugene W. Stark, Step...
APN
1999
Springer
15 years 8 months ago
Parallel Approaches to the Numerical Transient Analysis of Stochastic Reward Nets
Abstract. This paper presents parallel approaches to the complete transient numerical analysis of stochastic reward nets (SRNs) for both shared and distributed-memory machines. Par...
Susann C. Allmaier, David Kreische