Sciweavers

10909 search results - page 236 / 2182
» Evaluating Backup Algorithms
Sort
View
SUTC
2006
IEEE
15 years 10 months ago
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation
Security in wireless ad hoc networks is hard to achieve due to the vulnerability of its links, limited physical protection, and the absence of a centralized management point. Cons...
Edith C. H. Ngai, Michael R. Lyu
ICMCS
2005
IEEE
119views Multimedia» more  ICMCS 2005»
15 years 10 months ago
Evaluation of the Interleaved Source Coding (ISC) Under Packet Correlation
Network impairments such as delay and packet losses have severe impact on the presentation quality of many predictive video sources. Prior researches (e.g., [1]-[3][5]-[9][11]-[13...
Jin Young Lee, Hayder Radha
ICPP
2005
IEEE
15 years 10 months ago
Performance Evaluation of View-Oriented Parallel Programming
This paper evaluates the performance of a novel View-Oriented Parallel Programming style for parallel programming on cluster computers. View-Oriented Parallel Programming is based...
Zhiyi Huang, Martin K. Purvis, Paul Werstein
VLSID
2005
IEEE
97views VLSI» more  VLSID 2005»
15 years 10 months ago
Q-PREZ: QBF Evaluation Using Partition, Resolution and Elimination with ZBDDs
In recent years, there has been an increasing interest in Quantified Boolean Formula (QBF) evaluation, since several VLSI CAD problems can be formulated efficiently as QBF insta...
Kameshwar Chandrasekar, Michael S. Hsiao
120
Voted
AIED
2005
Springer
15 years 10 months ago
Advanced Capabilities for Evaluating Student Writing: Detecting Off-Topic Essays Without Topic-Specific Training
We have developed a method to identify when a student essay is off-topic, i.e. the essay does not respond to the test question topic. This task is motivated by a real-world problem...
Jill Burstein, Derrick Higgins