Sciweavers

18306 search results - page 3355 / 3662
» Algorithmics in Exponential Time
Sort
View
CCS
1999
ACM
15 years 7 months ago
A High-Performance Network Intrusion Detection System
In this paper we present a new approach for network intrusion detection based on concise specifications that characterize normal and abnormal network packet sequences. Our speciļ...
R. Sekar, Y. Guang, S. Verma, T. Shanbhag
RTSS
1999
IEEE
15 years 7 months ago
A Scalable Solution to the Multi-Resource QoS Problem
The problem of maximizing system utility by allocating a single finite resource to satisfy discrete Quality of Service (QoS) requirements of multiple applications along multiple Q...
Chen Lee, John P. Lehoczky, Daniel P. Siewiorek, R...
INFOCOM
1998
IEEE
15 years 7 months ago
TCP Fast Recovery Strategies: Analysis and Improvements
This paper suggests that, to match an ideal Internet gateway which rigorously enforces fair sharing among competing TCP connections, an ideal TCP sender should possess two propert...
Dong Lin, H. T. Kung
SIGGRAPH
1998
ACM
15 years 7 months ago
Recovering Photometric Properties of Architectural Scenes from Photographs
In this paper, we present a new approach to producing photorealistic computer renderings of real architectural scenes under novel lighting conditions, such as at different times o...
Yizhou Yu, Jitendra Malik
ICCAD
1997
IEEE
112views Hardware» more  ICCAD 1997»
15 years 7 months ago
Circuit optimization via adjoint Lagrangians
The circuit tuning problem is best approached by means of gradient-based nonlinear optimization algorithms. For large circuits, gradient computation can be the bottleneck in the o...
Andrew R. Conn, Ruud A. Haring, Chandramouli Viswe...
« Prev « First page 3355 / 3662 Last » Next »