Sciweavers

3972 search results - page 655 / 795
» Cosparse analysis modeling - uniqueness and algorithms
Sort
View
INFOCOM
2005
IEEE
15 years 9 months ago
Limiting path exploration in BGP
— Slow convergence in the Internet can be directly attributed to the “path exploration” phenomenon, inherent in all path vector protocols. The root cause for path exploration...
Jaideep Chandrashekar, Zhenhai Duan, Zhi-Li Zhang,...
INFOCOM
2005
IEEE
15 years 9 months ago
Pricing and revenue sharing strategies for Internet service providers
— One of the challenges facing the networking industry today is to increase the profitability of Internet services. This calls for economic mechanisms that can enable providers ...
Linhai He, Jean C. Walrand
ISM
2005
IEEE
159views Multimedia» more  ISM 2005»
15 years 9 months ago
Avatar-centric Risk Evaluation
Hazard detection and prevention of natural and manmade disasters at critical civil infrastructure is becoming increasingly important. Recent events, such as earthquakes and terror...
Maria-Cruz Villa-Uriol, Falko Kuester, Oscar Garc&...
141
Voted
RTSS
2005
IEEE
15 years 9 months ago
Decentralized Utilization Control in Distributed Real-Time Systems
Many real-time systems must control their CPU utilizations in order to meet end-to-end deadlines and prevent overload. Utilization control is particularly challenging in distribut...
Xiaorui Wang, Dong Jia, Chenyang Lu, Xenofon D. Ko...
SIGIR
2005
ACM
15 years 9 months ago
Bootstrapping dictionaries for cross-language information retrieval
The bottleneck for dictionary-based cross-language information retrieval is the lack of comprehensive dictionaries, in particular for many different languages. We here introduce a...
Kornél G. Markó, Stefan Schulz, Olen...