Sciweavers

67 search results - page 11 / 14
» An example of a computable absolutely normal number
Sort
View
INFOCOM
2010
IEEE
14 years 7 months ago
An Axiomatic Theory of Fairness in Network Resource Allocation
We present a set of five axioms for fairness measures in resource allocation. A family of fairness measures satisfying the axioms is constructed. Well-known notions such as -fairne...
Tian Lan, David Kao, Mung Chiang, Ashutosh Sabharw...
BMCBI
2010
87views more  BMCBI 2010»
14 years 4 months ago
A fast and robust hepatocyte quantification algorithm including vein processing
Background: Quantification of different types of cells is often needed for analysis of histological images. In our project, we compute the relative number of proliferating hepatoc...
Tetyana Ivanovska, Andrea Schenk, André Hom...
ANLP
2000
157views more  ANLP 2000»
14 years 11 months ago
Experiments on Sentence Boundary Detection
This paper explores the problem of identifying sentence boundaries in the transcriptions produced by automatic speech recognition systems. An experiment which determines the level...
Mark Stevenson, Robert J. Gaizauskas
DRM
2006
Springer
15 years 1 months ago
Securing sensitive content in a view-only file system
One of the most fundamental problems in computer security is protecting sensitive digital information from unauthorized disclosure. There are a number of challenges, such as spywa...
Kevin Borders, Xin Zhao, Atul Prakash
CCGRID
2003
IEEE
15 years 2 months ago
Creating Services with Hard Guarantees from Cycle-Harvesting Systems
Abstract— Cycle-harvesting software on commodity computers is available from a number of companies and a significant part of the Grid computing landscape. However, creating comm...
Chris Kenyon, Giorgos Cheliotis