Sciweavers

1518 search results - page 246 / 304
» Cryptographic Test Correction
Sort
View
131
Voted
CCR
2011
14 years 7 months ago
Misbehaviors in TCP SACK generation
While analyzing CAIDA Internet traces of TCP traffic to detect instances of data reneging, we frequently observed seven misbehaviors in the generation of SACKs. These misbehaviors...
Nasif Ekiz, Abuthahir Habeeb Rahman, Paul D. Amer
98
Voted
COLING
2010
14 years 7 months ago
Chinese Frame Identification using T-CRF Model
As one of the important tasks of SemEval Evaluation, Frame Semantic Structure Extraction based on the FrameNet has received much more attention in NLP field. This task is often di...
Ru Li, Haijing Liu, Shuanghong Li
189
Voted
CSC
2010
14 years 7 months ago
Performance Modeling, Analysis, and Optimization of Cell-List Based Molecular Dynamics
- We have developed a performance prediction model for non-bonded interaction computations in molecular dynamics simulations, thereby predicting the optimal cell dimension in a lin...
Manaschai Kunaseth, Rajiv K. Kalia, Aiichiro Nakan...
OL
2011
332views Neural Networks» more  OL 2011»
14 years 7 months ago
A robust implementation of a sequential quadratic programming algorithm with successive error restoration
We consider sequential quadratic programming (SQP) methods for solving constrained nonlinear programming problems. It is generally believed that SQP methods are sensitive to the a...
Klaus Schittkowski
137
Voted
TC
2010
14 years 7 months ago
Generating Reliable Code from Hybrid-Systems Models
Hybrid systems have emerged as an appropriate formalism to model embedded systems as they capture the theme of continuous dynamics with discrete control. Under this paradigm, distr...
Madhukar Anand, Sebastian Fischmeister, Yerang Hur...