• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 7,706
Next 10 →

Face Recognition: A Literature Survey

by W. Zhao, R. Chellappa, P. J. Phillips, A. Rosenfeld , 2000
"... ... This paper provides an up-to-date critical survey of still- and video-based face recognition research. There are two underlying motivations for us to write this survey paper: the first is to provide an up-to-date review of the existing literature, and the second is to offer some insights into ..."
Abstract - Cited by 1398 (21 self) - Add to MetaCart
... This paper provides an up-to-date critical survey of still- and video-based face recognition research. There are two underlying motivations for us to write this survey paper: the first is to provide an up-to-date review of the existing literature, and the second is to offer some insights

The synchronous dataflow programming language LUSTRE

by N. Halbwachs, P. Caspi, P. Raymond, D. Pilaud - Proceedings of the IEEE , 1991
"... This paper describes the language Lustre, which is a dataflow synchronous language, designed for programming reactive systems --- such as automatic control and monitoring systems --- as well as for describing hardware. The dataflow aspect of Lustre makes it very close to usual description tools in t ..."
Abstract - Cited by 646 (50 self) - Add to MetaCart
This paper describes the language Lustre, which is a dataflow synchronous language, designed for programming reactive systems --- such as automatic control and monitoring systems --- as well as for describing hardware. The dataflow aspect of Lustre makes it very close to usual description tools

On the Self-similar Nature of Ethernet Traffic (Extended Version)

by Will E. Leland, Murad S. Taqqu, Walter Willinger, Daniel V. Wilson , 1994
"... We demonstrate that Ethernet LAN traffic is statistically self-similar, that none of the commonly used traffic models is able to capture this fractal-like behavior, that such behavior has serious implications for the design, control, and analysis of high-speed, cell-based networks, and that aggrega ..."
Abstract - Cited by 2213 (46 self) - Add to MetaCart
discussion of the underlying mathematical and statistical properties of self-similarity and their relationship with actual network behavior. We also present traffic models based on self-similar stochastic processes that provide simple, accurate, and realistic descriptions of traffic scenarios expected during

A software framework for matchmaking based on semantic web technology

by Lei Li, Ian Horrocks , 2003
"... An important objective of the Semantic Web is to make Electronic Commerce interactions more flexible and automated. To achieve this, standardisation of ontologies, message content and message protocols will be necessary. In this paper we investigate how Semantic and Web Services technologies can be ..."
Abstract - Cited by 398 (5 self) - Add to MetaCart
be used to support service advertisement and discovery in ecommerce. In particular, we describe the design and implementation of a service matchmaking prototype which uses a DAML-S based ontology and a Description Logic reasoner to compare ontology based service descriptions. By representing the semantics

Flexible Update Propagation for Weakly Consistent Replication

by Karin Petersen, Mike J. Spreitzer , Douglas B. Terry , Marvin M. Theimer, Alan J. Demers
"... Bayou’s anti-entropy protocol for update propagation between weakly consistent storage replicas is based on pair-wise communication, the propagation of write operations, and a set of ordering and closure constraints on the propagation of the writes. The simplicity of the design makes the protocol ve ..."
Abstract - Cited by 327 (11 self) - Add to MetaCart
Bayou’s anti-entropy protocol for update propagation between weakly consistent storage replicas is based on pair-wise communication, the propagation of write operations, and a set of ordering and closure constraints on the propagation of the writes. The simplicity of the design makes the protocol

MODFLOW–2005, the U.S. Geological Survey modular ground-water model— Documentation of the multiple-refined-areas capability of local grid refinement

by R. Anderman, Mary C. Hill, Bruce Babbitt Secretary, Charles G. Groat - LGR) and the Boundary Flow and Head (BFH) Package: U.S. Geological Survey Techniques and Methods 6-A21 , 2007
"... The use of trade, product, industry, or firm names is for descriptive purposes only and does not imply endorsement by the U.S. Government. For additional information write to: Copies of this report can be purchased from: ..."
Abstract - Cited by 238 (7 self) - Add to MetaCart
The use of trade, product, industry, or firm names is for descriptive purposes only and does not imply endorsement by the U.S. Government. For additional information write to: Copies of this report can be purchased from:

Revised 5 report on the algorithmic language Scheme

by Richard Kelsey, William Clinger, Jonathan Rees (editors, H. Abelson, R. K. Dybvig, C. T. Haynes, G. J. Rozas, D. H. Bartley, R. Halstead, D. Oxley, G. J. Sussman, G. Brooks, C. Hanson, K. M. Pitman, M. Wand - ACM SIGPLAN Notices , 1998
"... The report gives a defining description of the programming language Scheme. Scheme is a statically scoped and properly tail-recursive dialect of the Lisp programming language invented by Guy Lewis Steele Jr. and Gerald Jay Sussman. It was designed to have an exceptionally clear and simple semantics ..."
Abstract - Cited by 246 (4 self) - Add to MetaCart
The report gives a defining description of the programming language Scheme. Scheme is a statically scoped and properly tail-recursive dialect of the Lisp programming language invented by Guy Lewis Steele Jr. and Gerald Jay Sussman. It was designed to have an exceptionally clear and simple semantics

Description

by unknown authors
"... We find the current wording of the Report LUNS command ambiguous for some scenarios. Consider a multi-LUN device that supports the industry common practice of LUN mapping and masking. A particular host may not be allowed to access LUN 0 for Read/Write but does have access to other LUNS. The question ..."
Abstract - Add to MetaCart
We find the current wording of the Report LUNS command ambiguous for some scenarios. Consider a multi-LUN device that supports the industry common practice of LUN mapping and masking. A particular host may not be allowed to access LUN 0 for Read/Write but does have access to other LUNS

STAMP: Stanford Transactional Applications for Multi-Processing

by Chí Cao Minh, Jaewoong Chung, Christos Kozyrakis, Kunle Olukotun
"... Abstract—Transactional Memory (TM) is emerging as a promising technology to simplify parallel programming. While several TM systems have been proposed in the research literature, we are still missing the tools and workloads necessary to analyze and compare the proposals. Most TM systems have been ev ..."
Abstract - Cited by 206 (9 self) - Add to MetaCart
evaluated using microbenchmarks, which may not be representative of any real-world behavior, or individual applications, which do not stress a wide range of execution scenarios. We introduce the Stanford Transactional Applications for Multi-Processing (STAMP), a comprehensive benchmark suite for evaluating

Writing and Correcting Textual Scenarios for System Design

by Camille Ben Achour, Camille Ben Achour - In: Natural Language and Information Systems Workshop (NLIS’98 , 1998
"... Since a few years, scenarios have gained in popularity in Requirements Engineering. Textual scenarios are narrative descriptions of flows of actions between agents. They are often proposed to elicit, validate or document requirements. The CREWS experience has shown that the advantage of scenarios is ..."
Abstract - Cited by 5 (0 self) - Add to MetaCart
Since a few years, scenarios have gained in popularity in Requirements Engineering. Textual scenarios are narrative descriptions of flows of actions between agents. They are often proposed to elicit, validate or document requirements. The CREWS experience has shown that the advantage of scenarios
Next 10 →
Results 1 - 10 of 7,706
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University