Sciweavers

4762 search results - page 744 / 953
» About the use of protein models
Sort
View
ISM
2008
IEEE
101views Multimedia» more  ISM 2008»
15 years 8 months ago
Photo Context as a Bag of Words
In the recent years, photo context metadata (e.g., date, GPS coordinates) have been proved to be useful in the management of personal photos. However, these metadata are still poo...
Windson Viana, Samira Hammiche, Marlène Vil...
59
Voted
INFOCOM
2007
IEEE
15 years 7 months ago
Revenue Focused Protection for VOD in DWDM Rings
—New protection schemes for video on demand (VOD) in a DWDM ring network are proposed that employ information per customer. Unlike prior schemes that rely on fixed priorities, th...
Ornan Ori Gerstel, Galen H. Sasaki, Ashok Balasubr...
CAV
2007
Springer
173views Hardware» more  CAV 2007»
15 years 7 months ago
Array Abstractions from Proofs
stractions from Proofs Ranjit Jhala1 Kenneth L. McMillan2 1 UC San Diego 2 Cadence Berkeley Laboratories We present a technique for using infeasible program paths to automatically ...
Ranjit Jhala, Kenneth L. McMillan
126
Voted
TACAS
2007
Springer
158views Algorithms» more  TACAS 2007»
15 years 7 months ago
Automatic Analysis of the Security of XOR-Based Key Management Schemes
We describe a new algorithm for analysing security protocols that use XOR, such as key-management APIs. As a case study, we consider the IBM 4758 CCA API, which is widely used in t...
Véronique Cortier, Gavin Keighren, Graham S...
ANSS
2006
IEEE
15 years 7 months ago
Moderating Simulation Lag in Haptic Virtual Environments
Simulation lag is a known issue in networked virtual environments where users are geographically distributed. When users collaborate across the network using haptics, there are al...
Azzedine Boukerche, Shervin Shirmohammadi, Abuhoss...