Sciweavers

4762 search results - page 813 / 953
» About the use of protein models
Sort
View
CHI
2010
ACM
15 years 8 months ago
Cars, calls, and cognition: investigating driving and divided attention
Conversing on cell phones while driving an automobile is a common practice. We examine the interference of the cognitive load of conversational dialog with driving tasks, with the...
Shamsi T. Iqbal, Yun-Cheng Ju, Eric Horvitz
SIGCOMM
2009
ACM
15 years 7 months ago
Understanding TCP incast throughput collapse in datacenter networks
TCP Throughput Collapse, also known as Incast, is a pathological behavior of TCP that results in gross under-utilization of link capacity in certain many-to-one communication patt...
Yanpei Chen, Rean Griffith, Junda Liu, Randy H. Ka...
ICDM
2008
IEEE
113views Data Mining» more  ICDM 2008»
15 years 7 months ago
Online Reliability Estimates for Individual Predictions in Data Streams
Several predictive systems are nowadays vital for operations and decision support. The quality of these systems is most of the time defined by their average accuracy which has lo...
Pedro Pereira Rodrigues, João Gama, Zoran B...
ISMAR
2008
IEEE
15 years 7 months ago
Generating perceptually-correct shadows for mixed reality
Even though shadows are important for photometric consistency in Mixed Reality (MR) [1]. When human cannot perceive the inconsistency of artificial shadows which are not physicall...
Gaku Nakano, Itaru Kitahara, Yuichi Ohta
CIA
2007
Springer
15 years 7 months ago
High-Performance Agent System for Intrusion Detection in Backbone Networks
Abstract. This paper presents a design of high-performance agentbased intrusion detection system designed for deployment on high-speed network links. To match the speed requirement...
Martin Rehák, Michal Pechoucek, Pavel Celed...