Sciweavers

1477 search results - page 272 / 296
» Token flow control
Sort
View
136
Voted
ICWS
2009
IEEE
15 years 1 months ago
QoS-Driven Adaptation of BPEL Scenario Execution
BPEL/WSBPEL is the predominant approach for combining individual web services into integrated business processes, allowing for the specification of their sequence, control flow an...
Christos Kareliotis, Costas Vassilakis, Stathis Ro...
234
Voted
BWCCA
2010
14 years 10 months ago
Advanced Design Issues for OASIS Network-on-Chip Architecture
Network-on-Chip (NoC) architectures provide a good way of realizing efficient interconnections and largely alleviate the limitations of bus-based solutions. NoC has emerged as a so...
Kenichi Mori, Adam Esch, Abderazek Ben Abdallah, K...
188
Voted
JDCTA
2010
688views more  JDCTA 2010»
14 years 10 months ago
Hand Mouse: Real Time Hand Motion Detection System Based on Analysis of Finger Blobs
Hand detection is a fundamental step in many practical applications as gesture recognition, video surveillance, and multimodal machine interface and so on. The aim of this paper i...
Ibrahim Furkan Ince, Manuel Socarras-Garzon, Tae-C...
120
Voted
MMAS
2010
Springer
14 years 10 months ago
Simplified Modelling of a Thermal Bath, with Application to a Fluid Vortex System
Based on the thermodynamic concept of a reservoir, we investigate a computational model for interaction with unresolved degrees of freedom (a thermal bath). We assume that a finite...
Svetlana Dubinkina, Jason Frank, Ben Leimkuhler
145
Voted
TDSC
2010
172views more  TDSC 2010»
14 years 10 months ago
Proactive Detection of Computer Worms Using Model Checking
Although recent estimates are speaking of 200,000 different viruses, worms, and Trojan horses, the majority of them are variants of previously existing malware. As these variants m...
Johannes Kinder, Stefan Katzenbeisser, Christian S...