Sciweavers

9888 search results - page 330 / 1978
» Active Algorithm Selection
Sort
View
CLUSTER
2004
IEEE
15 years 3 months ago
Performance Evaluation of Shared Mesh Protection in WDM Networks
The efficient use of network capacity in shared restoration schemes strongly depends upon the path selection procedure. In this paper we propose and evaluate path selection algorit...
Chadi Assi, Ahmad Khalil, Nasir Ghani, Abdallah Sh...
MOBIHOC
2002
ACM
16 years 3 months ago
Path set selection in mobile ad hoc networks
Topological changes in mobile ad hoc networks frequently render routing paths unusable. Such recurrent path failures have detrimental effects on the network ability to support QoS...
Emin Gün Sirer, Panagiotis Papadimitratos, Zy...
CVPR
2000
IEEE
16 years 6 months ago
Representation and Optimal Recognition of Human Activities
Towards the goal of realizing a generic automatichuman activity recognition system, a new formalism is proposed. Activities are described by a chained hierarchical representation ...
François Brémond, Ramakant Nevatia, ...
IUI
2009
ACM
16 years 28 days ago
Using salience to segment desktop activity into projects
Knowledge workers must manage large numbers of simultaneous, ongoing projects that collectively involve huge numbers of resources (documents, emails, web pages, calendar items, et...
Daniel Lowd, Nicholas Kushmerick
IEEEARES
2008
IEEE
15 years 10 months ago
Detecting Bots Based on Keylogging Activities
—A bot is a piece of software that is usually installed on an infected machine without the user’s knowledge. A bot is controlled remotely by the attacker under a Command and Co...
Yousof Al-Hammadi, Uwe Aickelin