Sciweavers

13977 search results - page 2707 / 2796
» Evolution in complex systems
Sort
View
128
Voted
POLICY
2005
Springer
15 years 7 months ago
Policy Conflict Analysis for Quality of Service Management
Policy-based management provides the ability to (re-)configure differentiated services networks so that desired Quality of Service (QoS) goals are achieved. Relevant configuration...
Marinos Charalambides, Paris Flegkas, George Pavlo...
RT
2005
Springer
15 years 7 months ago
Estimation of 3D Faces and Illumination from Single Photographs Using A Bilinear Illumination Model
3D Face modeling is still one of the biggest challenges in computer graphics. In this paper we present a novel framework that acquires the 3D shape, texture, pose and illumination...
Jinho Lee, Hanspeter Pfister, Baback Moghaddam, Ra...
94
Voted
RTA
2005
Springer
15 years 7 months ago
The Algebra of Equality Proofs
Proofs of equalities may be built from assumptions using proof rules for reflexivity, symmetry, and transitivity. Reflexivity is an axiom proving x=x for any x; symmetry is a 1-p...
Aaron Stump, Li-Yang Tan
117
Voted
VIZSEC
2005
Springer
15 years 7 months ago
Multiple Coordinated Views for Network Attack Graphs
While efficient graph-based representations have been developed for modeling combinations of low-level network attacks, relatively little attention has been paid to effective tech...
Steven Noel, Michael Jacobs, Pramod Kalapa, Sushil...
CASES
2004
ACM
15 years 7 months ago
Procedure placement using temporal-ordering information: dealing with code size expansion
Abstract— In a direct-mapped instruction cache, all instructions that have the same memory address modulo the cache size, share a common and unique cache slot. Instruction cache ...
Christophe Guillon, Fabrice Rastello, Thierry Bida...
« Prev « First page 2707 / 2796 Last » Next »