Sciweavers

2485 search results - page 398 / 497
» A Communicating Tree Model for Generating Network Applicatio...
Sort
View
118
Voted
INFOCOM
2010
IEEE
15 years 1 months ago
Throughput and Delay Analysis on Uncoded and Coded Wireless Broadcast with Hard Deadline Constraints
Multimedia streaming applications have stringent QoS requirements. Typically each packet is associated with a packet delivery deadline. This work models and considers realtime stre...
Xiaohang Li, Chih-Chun Wang, Xiaojun Lin
130
Voted
ICPR
2008
IEEE
16 years 4 months ago
A probabilistic Self-Organizing Map for facial recognition
This article presents a method aiming at quantifying the visual similarity between an image and a class model. This kind of problem is recurrent in many applications such as objec...
Christophe Garcia, Grégoire Lefebvre
ISMB
1994
15 years 4 months ago
Stochastic Motif Extraction Using Hidden Markov Model
In this paper, westudy the application of an ttMM(hidden Markov model) to the problem of representing protein sequencesby a stochastic motif. Astochastic protein motif represents ...
Yukiko Fujiwara, Minoru Asogawa, Akihiko Konagaya
141
Voted
SIGMETRICS
2006
ACM
102views Hardware» more  SIGMETRICS 2006»
15 years 9 months ago
On the way to a distributed systems calculus: an end-to-end network calculus with data scaling
Network calculus is a min-plus system theory which facilitates the efficient derivation of performance bounds for networks of queues. It has successfully been applied to provide e...
Markus Fidler, Jens B. Schmitt
145
Voted
CCS
2008
ACM
15 years 5 months ago
Efficient security primitives derived from a secure aggregation algorithm
By functionally decomposing a specific algorithm (the hierarchical secure aggregation algorithm of Chan et al. [3] and Frikken et al. [7]), we uncover a useful general functionali...
Haowen Chan, Adrian Perrig