Sciweavers

5948 search results - page 931 / 1190
» Computing Robust Counter-Strategies
Sort
View
IPPS
2003
IEEE
15 years 9 months ago
Gene Clustering Using Self-Organizing Maps and Particle Swarm Optimization
Gene clustering, the process of grouping related genes in the same cluster, is at the foundation of different genomic studies that aim at analyzing the function of genes. Microarr...
Xiang Xiao, Ernst R. Dow, Russell C. Eberhart, Zin...
NDSS
2003
IEEE
15 years 9 months ago
Secure IP Telephony using Multi-layered Protection
This paper presents the design and analysis of a multilayer protection scheme against denial-of-service (DoS) attacks in IP telephony enabled enterprise networks. While there are ...
Brennen Reynolds, Dipak Ghosal
P2P
2003
IEEE
110views Communications» more  P2P 2003»
15 years 9 months ago
Range Addressable Network: A P2P Cache Architecture for Data Ranges
Peer-to-peer computing paradigm is emerging as a scalable and robust model for sharing media objects. In this paper, we propose an architecture and describe the associated algorit...
Anshul Kothari, Divyakant Agrawal, Abhishek Gupta,...
SIBGRAPI
2003
IEEE
15 years 9 months ago
Effective Image Retrieval by Shape Saliences
Content-Based Image Retrieval (CBIR) systems have been developed aiming at enabling users to search and retrieve images based on their properties such as shape, color and texture....
Ricardo da Silva Torres, Eduardo M. Picado, Alexan...
144
Voted
CASES
2003
ACM
15 years 9 months ago
Architectural optimizations for low-power, real-time speech recognition
The proliferation of computing technology to low power domains such as hand–held devices has lead to increased interest in portable interface technologies, with particular inter...
Rajeev Krishna, Scott A. Mahlke, Todd M. Austin