Sciweavers

3657 search results - page 566 / 732
» A Study of Practical Deduplication
Sort
View
IJCOMSYS
2007
88views more  IJCOMSYS 2007»
14 years 10 months ago
Potential performance bottleneck in Linux TCP
TCP is the most widely used transport protocol on the Internet today. Over the years, especially recently, due to requirements of high bandwidth transmission, various approaches h...
Wenji Wu, Matt Crawford
IJCSA
2007
213views more  IJCSA 2007»
14 years 10 months ago
Adaptive Depth Control for Autonomous Underwater Vehicles Based on Feedforward Neural Networks
This paper studies the design and application of the neural network based adaptive control scheme for autonomous underwater vehicle's (AUV's) depth control system that i...
Yang Shi, Weiqi Qian, Weisheng Yan, Jun Li
71
Voted
SIGMETRICS
2008
ACM
14 years 10 months ago
An SLA perspective on the router buffer sizing problem
In this paper, we discuss recent work on buffer sizing in the context of an ISP's need to offer and guarantee competitive Service Level Agreements (SLAs) to its customers. Si...
Joel Sommers, Paul Barford, Albert G. Greenberg, W...
IOR
2007
95views more  IOR 2007»
14 years 10 months ago
Index Policies for Shooting Problems
We consider a scenario in which a single Red wishes to shoot at a collection of Blue targets, one at a time, to maximise some measure of return obtained from Blues killed before R...
Kevin D. Glazebrook, Christopher Kirkbride, H. M. ...
TCSV
2008
124views more  TCSV 2008»
14 years 10 months ago
A Novel Look-Up Table Design Method for Data Hiding With Reduced Distortion
Look-up table (LUT)-based data hiding is a simple and efficient technique to hide secondary information (watermark) into multimedia work for various applications such as copyright ...
Xiao-Ping Zhang, Kan Li, Xiaofeng Wang