Sciweavers

947 search results - page 111 / 190
» Analysis of Techniques to Improve Protocol Processing Latenc...
Sort
View
ICASSP
2011
IEEE
14 years 5 months ago
Bayesian topic models for describing computer network behaviors
We consider the use of Bayesian topic models in the analysis of computer network traffic. Our approach utilizes latent Dirichlet allocation and time-varying dynamic latent Dirich...
Christopher Cramer, Lawrence Carin
INFOCOM
2007
IEEE
15 years 7 months ago
Software TDMA for VoIP Applications Over IEEE802.11 Wireless LAN
Abstract—An emerging killer application for enterprise wireless LANs (WLANs) is voice over IP (VoIP) telephony, which promises to greatly improve the reachability and mobility of...
Fanglu Guo, Tzi-cker Chiueh
WCRE
2008
IEEE
15 years 7 months ago
Pitfalls in Aspect Mining
The research domain of aspect mining studies the problem of (semi-)automatically identifying potential aspects and crosscutting concerns in a software system, to improve the syste...
Kim Mens, Andy Kellens, Jens Krinke
TSMC
1998
93views more  TSMC 1998»
15 years 1 months ago
Toward a completely automatic neural-network-based human chromosome analysis
Abstract—The application of neural networks (NN’s) to automatic analysis of chromosome images is investigated in this paper. All aspects of the analysis, namely segmentation, f...
Boaz Lerner
MUE
2007
IEEE
111views Multimedia» more  MUE 2007»
15 years 7 months ago
Securing the Pharmaceutical Supply Chain using RFID
RFID technology has been applied to a number of applications. In [5], a protocol was described how to apply RFID to currency to provide integrity (e.g. reduce counterfeiting) whil...
Brian King, Xiaolan Zhang 0003