Sciweavers

5263 search results - page 1046 / 1053
» Data sources selection for XML data sources
Sort
View
WCET
2010
14 years 7 months ago
Bounding the Effects of Resource Access Protocols on Cache Behavior
The assumption of task independence has long been consubstantial with the formulation of many schedulability analysis techniques. That assumption is evidently advantageous for the...
Enrico Mezzetti, Marco Panunzio, Tullio Vardanega
DPHOTO
2009
200views Hardware» more  DPHOTO 2009»
14 years 7 months ago
Illuminant estimation and detection using near-infrared
Digital camera sensors are sensitive to wavelengths ranging from the ultraviolet (200-400nm) to the near-infrared (700-100nm) bands. This range is, however, reduced because the ai...
Clément Fredembach, Sabine Süsstrunk
CORR
2010
Springer
115views Education» more  CORR 2010»
14 years 7 months ago
Novel Mechanism to Defend DDoS Attacks Caused by Spam
Corporate mail services are designed to perform better than public mail services. Fast mail delivery, large size file transfer as an attachments, high level spam and virus protect...
Dhinaharan Nagamalai, Beatrice Cynthia Dhinakaran,...
ADHOC
2010
317views more  ADHOC 2010»
14 years 6 months ago
Simple ant routing algorithm strategies for a (Multipurpose) MANET model
A Mobile Ad-hoc Network has limited and scarce resources and thus routing protocols in such environments must be kept as simple as possible. The Simple Ant Routing Algorithm (SARA...
Fernando Correia, Teresa Vazão
CORR
2011
Springer
189views Education» more  CORR 2011»
14 years 4 months ago
Aging in language dynamics
Human languages evolve continuously, and a puzzling problem is how to reconcile the apparent robustness of most of the deep linguistic structures we use with the evidence that the...
Animesh Mukherjee, Francesca Tria, Andrea Baronche...
« Prev « First page 1046 / 1053 Last » Next »