Sciweavers

893 search results - page 56 / 179
» Descent Theory for Schemes
Sort
View
CCS
2007
ACM
15 years 6 months ago
Keystroke statistical learning model for web authentication
Keystroke typing characteristics is considered as one of the important biometric features that can be used to protect users against malicious attacks. In this paper we propose a s...
Cheng-Huang Jiang, Shiuhpyng Shieh, Jen-Chien Liu
ATAL
2004
Springer
15 years 5 months ago
Adaptive, Distributed Control of Constrained Multi-Agent Systems
Product Distribution (PD) theory was recently developed as a framework for analyzing and optimizing distributed systems. In this paper we demonstrate its use for adaptive distribu...
Stefan Bieniawski, David Wolpert
RTAS
2003
IEEE
15 years 5 months ago
Feedback Control with Queueing-Theoretic Prediction for Relative Delay Guarantees in Web Servers
The use of feedback control theory for performance guarantees in QoS-aware systems has gained much attention in recent years. In this paper, we investigate merging, within a singl...
Ying Lu 0002, Tarek F. Abdelzaher, Chenyang Lu, Lu...
DEXA
1997
Springer
137views Database» more  DEXA 1997»
15 years 4 months ago
A Retrieval Mechanism for Semi-Structured Photographic Collections
Abstract. In this paper, a new approach for retrieval from semistructured photographic collections is described. We have developed a retrieval model based on the Dempster-Shafer th...
Joemon M. Jose, David J. Harper
GLOBECOM
2007
IEEE
15 years 3 months ago
Mean-Field Analysis of Buffer Sizing
Two schools of thoughts have emerged over the recent debate on internet router buffer sizing. One school argues that the presence of a large number of flows leads to traffic desync...
Mei Wang