Sciweavers

8697 search results - page 1551 / 1740
» Measures of Distributional Similarity
Sort
View
IADIS
2004
14 years 11 months ago
End to End Defence Against DDoS Atacks
Denial of Service (DoS) attacks and Distributed Denial of Service (DDoS) attacks accounted for more losses than Internet financial fraud and viruses combined (CSI/FBI 2003). The I...
Anastasia Gemona, Ishbel Duncan, Colin Allison, Al...
ICHIM
2001
190views more  ICHIM 2001»
14 years 11 months ago
Chromatic Adaptation Post-Filtering in Image Synthesis Reproduction of Ancient Building for Restoration Support
Within the field of cultural heritage restoration, experts are interested in the analysis of data describing the condition and history of ancient monuments. Data are usually distr...
Maurizio Rossi, Daniele Marini, Alessandro Rizzi
CASCON
1993
106views Education» more  CASCON 1993»
14 years 11 months ago
Enterprise in context: assessing the usability of parallel programming environments
The growth of commercial and academic interest in parallel and distributed computing during the past fifteen years has been accompanied by a corresponding increase in the number o...
Gregory V. Wilson, Jonathan Schaeffer, Duane Szafr...
CEC
2010
IEEE
14 years 11 months ago
Beyond No Free Lunch: Realistic algorithms for arbitrary problem classes
In this paper we present a simple and general new No Free Lunch-like result that applies to revisiting algorithms searching arbitrary problem sets. We begin by unifying the assumpt...
James A. R. Marshall, Thomas G. Hinton
CONEXT
2009
ACM
14 years 11 months ago
RFDump: an architecture for monitoring the wireless ether
Networking researchers have been using tools like wireshark and tcpdump to sniff packets on physical links that use different types of datalink protocols, e.g. Ethernet or 802.11,...
Kaushik Lakshminarayanan, Samir Sapra, Srinivasan ...
« Prev « First page 1551 / 1740 Last » Next »