Sciweavers

22114 search results - page 4331 / 4423
» Use of Models and Modelling Techniques for Service Developme...
Sort
View
ISSTA
2012
ACM
13 years 8 months ago
Measuring enforcement windows with symbolic trace interpretation: what well-behaved programs say
A static analysis design is sufficient if it can prove the property of interest with an acceptable number of false alarms. Ultimately, the only way to confirm that an analysis d...
Devin Coughlin, Bor-Yuh Evan Chang, Amer Diwan, Je...
TKDE
2012
208views Formal Methods» more  TKDE 2012»
13 years 8 months ago
A Knowledge-Driven Approach to Activity Recognition in Smart Homes
Abstract—This paper introduces a knowledge-driven approach to real-time, continuous activity recognition based on multisensor data streams in smart homes. The approach goes beyon...
Liming Chen, Chris D. Nugent, Hui Wang
BMCBI
2006
89views more  BMCBI 2006»
15 years 5 months ago
SPODOBASE : an EST database for the lepidopteran crop pest Spodoptera
Background: The Lepidoptera Spodoptera frugiperda is a pest which causes widespread economic damage on a variety of crop plants. It is also well known through its famous Sf9 cell ...
Vincent Nègre, Thierry Hotelier, Anne-Natha...
VCIP
2000
128views Communications» more  VCIP 2000»
15 years 6 months ago
Video Quality Experts Group: current results and future directions
Subjective assessment methods have been used reliably for many years to evaluate video quality. They continue to provide the most reliable assessments compared to objective method...
Ann M. Rohaly, Philip J. Corriveau, John M. Libert...
SPAA
2010
ACM
15 years 10 months ago
Tree network coding for peer-to-peer networks
Partitioning is the dominant technique to transmit large files in peer-to-peer networks. A peer can redistribute each part immediately after its download. BitTorrent combines thi...
Arne Vater, Christian Schindelhauer, Christian Ort...
« Prev « First page 4331 / 4423 Last » Next »