Sciweavers

2587 search results - page 495 / 518
» Intrusion Tolerant Systems
Sort
View
FGR
2006
IEEE
156views Biometrics» more  FGR 2006»
15 years 5 months ago
A Realtime Shrug Detector
A realtime system for shrug detection is discussed in this paper. The system is automatically initialized by a face detector based on Ada-boost[14]. After frontal face is localize...
Huazhong Ning, Tony X. Han, Yuxiao Hu, ZhenQiu Zha...
PPAM
2005
Springer
15 years 5 months ago
A Web Computing Environment for Parallel Algorithms in Java
We present a web computing library (PUBWCL) in Java that allows to execute tightly coupled, massively parallel algorithms in the bulk-synchronous (BSP) style on PCs distributed ove...
Olaf Bonorden, Joachim Gehweiler, Friedhelm Meyer ...
SIGCOMM
2004
ACM
15 years 5 months ago
A comparison of overlay routing and multihoming route control
The limitations of BGP routing in the Internet are often blamed for poor end-to-end performance and prolonged connectivity interruptions. Recent work advocates using overlays to e...
Aditya Akella, Jeffrey Pang, Bruce M. Maggs, Srini...
SIGCOMM
2004
ACM
15 years 5 months ago
A wavelet-based approach to detect shared congestion
Per-flow congestion control helps endpoints fairly and efficiently share network resources. Better utilization of network resources can be achieved, however, if congestion manag...
Min Sik Kim, Taekhyun Kim, YongJune Shin, Simon S....
MIDDLEWARE
2004
Springer
15 years 5 months ago
Guiding Queries to Information Sources with InfoBeacons
The Internet provides a wealth of useful information in a vast number of dynamic information sources, but it is difficult to determine which sources are useful for a given query. ...
Brian F. Cooper