Sciweavers

898 search results - page 143 / 180
» Transitions of the Pre-Symmetry Set
Sort
View
NDSS
2005
IEEE
15 years 3 months ago
Privacy-Preserving Friends Troubleshooting Network
— Content sharing is a popular use of peer-to-peer systems because of their inherent scalability and low cost of maintenance. In this paper, we leverage this nature of peer-topee...
Qiang Huang, Helen J. Wang, Nikita Borisov
IMC
2005
ACM
15 years 3 months ago
Characterization and Measurement of TCP Traversal Through NATs and Firewalls
In recent years, the standards community has developed techniques for traversing NAT/firewall boxes with UDP (that is, establishing UDP flows between hosts behind NATs). Because...
Saikat Guha, Paul Francis
CHARME
2005
Springer
176views Hardware» more  CHARME 2005»
15 years 3 months ago
An Analysis of SAT-Based Model Checking Techniques in an Industrial Environment
Abstract. Model checking is a formal technique for automatically verifying that a finite-state model satisfies a temporal property. In model checking, generally Binary Decision D...
Nina Amla, Xiaoqun Du, Andreas Kuehlmann, Robert P...
CIVR
2005
Springer
160views Image Analysis» more  CIVR 2005»
15 years 3 months ago
Story Segmentation in News Videos Using Visual and Text Cues
Abstract. In this paper, we present a framework for segmenting the news programs into different story topics. The proposed method utilizes both visual and text information of the v...
Yun Zhai, Alper Yilmaz, Mubarak Shah
CONCUR
2005
Springer
15 years 3 months ago
Deriving Weak Bisimulation Congruences from Reduction Systems
The focus of process calculi is interaction rather than computation, and for this very reason: (i) their operational semantics is conveniently expressed by labelled transition syst...
Roberto Bruni, Fabio Gadducci, Ugo Montanari, Pawe...