Sciweavers

2006 search results - page 138 / 402
» Heuristic Security-Testing Methods
Sort
View
106
Voted
EUROSYS
2006
ACM
15 years 10 months ago
On the road to recovery: restoring data after disasters
—Restoring data operations after a disaster is a daunting task: how should recovery be performed to minimize data loss and application downtime? Administrators are under consider...
Kimberly Keeton, Dirk Beyer 0002, Ernesto Brau, Ar...
BMCBI
2005
134views more  BMCBI 2005»
15 years 20 days ago
Ancestral sequence alignment under optimal conditions
Background: Multiple genome alignment is an important problem in bioinformatics. An important subproblem used by many multiple alignment approaches is that of aligning two multipl...
Alexander K. Hudek, Daniel G. Brown 0001
83
Voted
ICIP
2002
IEEE
16 years 2 months ago
Second-generation error concealment for video transport over error prone channels
Video transport over error prone channels may result in loss or erroneous decoding of the video. Error concealment is an effective mechanism to reconstruct the video content. In t...
Trista Pei-chun Chen, Tsuhan Chen
103
Voted
CIKM
2009
Springer
15 years 7 months ago
Adaptive relevance feedback in information retrieval
Relevance Feedback has proven very effective for improving retrieval accuracy. A difficult yet important problem in all relevance feedback methods is how to optimally balance the...
Yuanhua Lv, ChengXiang Zhai
CPAIOR
2007
Springer
15 years 7 months ago
Solving a Stochastic Queueing Control Problem with Constraint Programming
In a facility with front room and back room operations, it is useful to switch workers between the rooms in order to cope with changing customer demand. Assuming stochastic custome...
Daria Terekhov, J. Christopher Beck