Sciweavers

161 search results - page 32 / 33
» Fault localization based on information flow coverage
Sort
View
CORR
2008
Springer
107views Education» more  CORR 2008»
13 years 5 months ago
Our Brothers' Keepers: Secure Routing with High Performance
The Trinity [1] spam classification system is based on a distributed hash table that is implemented using a structured peer-to-peer overlay. Such an overlay must be capable of proc...
Alex Brodsky, Scott Lindenberg
CONEXT
2006
ACM
13 years 11 months ago
Synergy: blending heterogeneous measurement elements for effective network monitoring
Network traffic matrices are important for various network planning and management operations. Previous work for estimation of traffic matrices is based on either link load record...
Awais Ahmed Awan, Andrew W. Moore
MICRO
1998
IEEE
144views Hardware» more  MICRO 1998»
13 years 9 months ago
Analyzing the Working Set Characteristics of Branch Execution
To achieve highly accurate branch prediction, it is necessary not only to allocate more resources to branch prediction hardware but also to improve the understanding of branch exe...
Sangwook P. Kim, Gary S. Tyson
CGF
2008
201views more  CGF 2008»
13 years 5 months ago
Fluid in Video: Augmenting Real Video with Simulated Fluids
We present a technique for coupling simulated fluid phenomena that interact with real dynamic scenes captured as a binocular video sequence. We first process the binocular video s...
Vivek Kwatra, Philippos Mordohai, Rahul Narain, Sa...
SSIAI
2002
IEEE
13 years 10 months ago
Active Contours for Cell Tracking
This paper introduces an active contour or snakebased method for tracking cells within a video sequence. Specifically, we apply our cell tracking techniques to rolling leukocytes ...
Nilanjan Ray, Scott T. Acton