Sciweavers

1791 search results - page 220 / 359
» Behavioral Operations
Sort
View
NOMS
2010
IEEE
180views Communications» more  NOMS 2010»
15 years 2 months ago
Exploiting non-dedicated resources for cloud computing
—Popular web services and applications such as Google Apps, DropBox, and Go.Pc introduce a wasteful imbalance of processing resources. Each host operated by a provider serves hun...
Artur Andrzejak, Derrick Kondo, David P. Anderson
155
Voted
CCS
2010
ACM
15 years 1 months ago
The limits of automatic OS fingerprint generation
Remote operating system fingerprinting relies on implementation differences between OSs to identify the specific variant executing on a remote host. Because these differences can ...
David W. Richardson, Steven D. Gribble, Tadayoshi ...
127
Voted
ICDAR
2009
IEEE
15 years 10 months ago
Hierarchical On-line Arabic Handwriting Recognition
In this paper, we present a multi-level recognizer for online Arabic handwriting. In Arabic script (handwritten and printed), cursive writing – is not a style – it is an inher...
Raid Saabni, Jihad El-Sana
IWSOS
2009
Springer
15 years 10 months ago
Self-organization of Internet Paths
The Internet consists of a constantly evolving complex hierarchical architecture where routers are grouped into autonomous systems (ASes) that interconnect to provide global connec...
Tom Kleiberg, Piet Van Mieghem
130
Voted
CISIS
2008
IEEE
15 years 10 months ago
Adaptive Computational Chemotaxis in Bacterial Foraging Algorithm
Some researchers have illustrated how individual and groups of bacteria forage for nutrients and to model it as a distributed optimization process, which is called the Bacterial F...
Sambarta Dasgupta, Arijit Biswas, Ajith Abraham, S...