Sciweavers

2421 search results - page 83 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
91
Voted
ICANNGA
2007
Springer
100views Algorithms» more  ICANNGA 2007»
15 years 6 months ago
Genetic-Greedy Hybrid Approach for Topological Active Nets Optimization
In this paper we propose a genetic and greedy algorithm combination for the optimization of the Topological Active Nets (TAN) model. This is a deformable model used for image segme...
José Santos, Óscar Ibáñ...
SIGCOMM
2004
ACM
15 years 6 months ago
A wavelet-based approach to detect shared congestion
Per-flow congestion control helps endpoints fairly and efficiently share network resources. Better utilization of network resources can be achieved, however, if congestion manag...
Min Sik Kim, Taekhyun Kim, YongJune Shin, Simon S....
96
Voted
CSE
2009
IEEE
15 years 7 months ago
Localization of Shipping Containers in Ports and Terminals Using Wireless Sensor Networks
The most advanced logistics solutions that are currently adopted in ports and terminals use RFID- and GPS-based technologies to identify and localize shipping containers in the ya...
Stefano Abbate, Marco Avvenuti, Paolo Corsini, Ale...
101
Voted
IPPS
2008
IEEE
15 years 7 months ago
CoSL: A coordinated statistical learning approach to measuring the capacity of multi-tier websites
Website capacity determination is crucial to measurement-based access control, because it determines when to turn away excessive client requests to guarantee consistent service qu...
Jia Rao, Cheng-Zhong Xu
DSN
2004
IEEE
15 years 4 months ago
Verifying Web Applications Using Bounded Model Checking
The authors describe the use of bounded model checking (BMC) for verifying Web application code. Vulnerable sections of code are patched automatically with runtime guards, allowin...
Yao-Wen Huang, Fang Yu, Christian Hang, Chung-Hung...