Sciweavers

1078 search results - page 167 / 216
» Networks with Small Stretch Number
Sort
View
ACNS
2006
Springer
87views Cryptology» more  ACNS 2006»
15 years 5 months ago
Effect of Malicious Synchronization
Abstract. We study the impact of malicious synchronization on computer systems that serve customers periodically. Systems supporting automatic periodic updates are common in web se...
Mun Choon Chan, Ee-Chien Chang, Liming Lu, Peng So...
BMCBI
2007
194views more  BMCBI 2007»
15 years 2 months ago
A meta-data based method for DNA microarray imputation
Background: DNA microarray experiments are conducted in logical sets, such as time course profiling after a treatment is applied to the samples, or comparisons of the samples unde...
Rebecka Jörnsten, Ming Ouyang, Hui-Yu Wang
JOCN
2011
133views more  JOCN 2011»
14 years 4 months ago
A Candidate for the Attentional Bottleneck: Set-size Specific Modulation of the Right TPJ during Attentive Enumeration
■ Several recent behavioral studies have shown that the enumeration of a small number of items (a process termed subitizing) depends on the availability of attentional resources...
Petra Vetter, Brian Butterworth, Bahador Bahrami
SIGMOD
2005
ACM
178views Database» more  SIGMOD 2005»
16 years 2 months ago
Towards Effective Indexing for Very Large Video Sequence Database
With rapid advances in video processing technologies and ever fast increments in network bandwidth, the popularity of video content publishing and sharing has made similarity sear...
Heng Tao Shen, Beng Chin Ooi, Xiaofang Zhou
RTAS
1997
IEEE
15 years 6 months ago
Scalable Hardware Priority Queue Architectures for High-Speed Packet Switches
ÐWith effective packet-scheduling mechanisms, modern integrated networks can support the diverse quality-of-service requirements of emerging applications. However, arbitrating bet...
Sung-Whan Moon, Kang G. Shin, Jennifer Rexford