Sciweavers

5220 search results - page 987 / 1044
» Changing Persistent Applications
Sort
View
INFOCOM
2000
IEEE
15 years 7 months ago
Prevention of Deadlocks and Livelocks in Lossless, Backpressured Packet Networks
—When congestion builds up in a packet network, two general approaches are possible to cope with the shortage of buffer space. One approach is to drop incoming packets for which ...
Mark J. Karol, S. Jamaloddin Golestani, David Lee
116
Voted
IV
2000
IEEE
107views Visualization» more  IV 2000»
15 years 7 months ago
Ideograms in Polyscopic Modeling
“addiction” is defined as a pattern (abstract relationship). Such definition allows us to look in a new way at a number of cultural issues including the values, the lifestyl...
Dino Karabeg
106
Voted
SIGCOMM
2000
ACM
15 years 7 months ago
When the CRC and TCP checksum disagree
Traces of Internet packets from the past two years show that between 1 packet in 1,100 and 1 packet in 32,000 fails the TCP checksum, even on links where link-level CRCs should ca...
Jonathan Stone, Craig Partridge
110
Voted
ICPR
2010
IEEE
15 years 7 months ago
Detecting Altered Fingerprints
Abstract--The widespread deployment of Automated Fingerprint Identification Systems (AFIS) in law enforcement and border control applications has heightened the need for ensuring t...
Jianjiang Feng, Anil Jain, Arun Ross
192
Voted
DDEP
2000
Springer
15 years 7 months ago
Context-Aware Digital Documents Described in a High-Level Petri Net-Based Hypermedia System
As mobile computing becomes widespread, so will the need for digital document delivery by hypertextual means. A further trend will be the provision of the ability for devices to de...
Jin-Cheon Na, Richard Furuta