Sciweavers

8770 search results - page 1616 / 1754
» Named Service Networking
Sort
View
SOUPS
2006
ACM
15 years 5 months ago
The methodology and an application to fight against Unicode attacks
Unicode is becoming a dominant character representation format for information processing. This presents a very dangerous usability and security problem for many applications. The...
Anthony Y. Fu, Xiaotie Deng, Liu Wenyin, Greg Litt...
INFOCOM
2005
IEEE
15 years 4 months ago
Bayesian packet loss detection for TCP
— One of TCP’s critical tasks is to determine which packets are lost in the network, as a basis for control actions (flow control and packet retransmission). Modern TCP implem...
Nahur Fonseca, Mark Crovella
MIR
2005
ACM
181views Multimedia» more  MIR 2005»
15 years 4 months ago
Video booklet: a natural video searching and browsing interface
In this paper, we propose a novel system, named Video Booklet, which enables efficient and natural personal video browsing and searching. In the system, firstly representative th...
Cai-Zhi Zhu, Xian-Sheng Hua, Tao Mei, Xiuqing Wu
MSWIM
2005
ACM
15 years 4 months ago
Topology control with better radio models: implications for energy and multi-hop interference
Topology Control (TC) is a well-studied technique used in wireless ad hoc networks to find energy-efficient and/or low-interference subgraphs of the maxpower communication graph....
Douglas M. Blough, Mauro Leoncini, Giovanni Resta,...
ATAL
2005
Springer
15 years 4 months ago
Preprocessing techniques for accelerating the DCOP algorithm ADOPT
Methods for solving Distributed Constraint Optimization Problems (DCOP) have emerged as key techniques for distributed reasoning. Yet, their application faces significant hurdles...
Syed Muhammad Ali, Sven Koenig, Milind Tambe
« Prev « First page 1616 / 1754 Last » Next »