Sciweavers

2826 search results - page 199 / 566
» A resource-based analysis of IT sourcing
Sort
View
CORR
2010
Springer
156views Education» more  CORR 2010»
15 years 2 months ago
Topological analysis of the power grid and mitigation strategies against cascading failures
This paper presents a complex systems overview of a power grid network under cascading conditions. The cascading effect has been simulated on three different networks, the IEEE 300...
Sakshi Pahwa, Amelia Hodges, Caterina M. Scoglio, ...
98
Voted
ECR
2006
107views more  ECR 2006»
15 years 1 months ago
Software watermarking via opaque predicates: Implementation, analysis, and attacks
Within the software industry software piracy is a great concern. In this article we address this issue through a prevention technique called software watermarking. Depending on ho...
Ginger Myles, Christian S. Collberg
FGCS
2006
113views more  FGCS 2006»
15 years 1 months ago
Performance feature identification by comparative trace analysis
This work introduces a method for instrumenting applications, producing execution traces, and visualizing multiple trace instances to identify performance features. The approach p...
Daniel P. Spooner, Darren J. Kerbyson
MVA
2006
205views Computer Vision» more  MVA 2006»
15 years 1 months ago
Ontological inference for image and video analysis
Abstract This paper presents an approach to designing and implementing extensible computational models for perceiving systems based on a knowledge-driven joint inference approach. ...
Christopher Town
TIT
2008
87views more  TIT 2008»
15 years 1 months ago
Decode-and-Forward Relaying With Quantized Channel State Feedback: An Outage Exponent Analysis
The problem of resource allocation to maximize the outage exponent over a fading relay channel using the decodeand-forward protocol with quantized channel state feedback (CSF) is s...
Thanh Tùng Kim, Giuseppe Caire, Mikael Skog...