Sciweavers

16843 search results - page 3219 / 3369
» On Generalized Authorization Problems
Sort
View
ICPPW
2002
IEEE
15 years 10 months ago
Hebbian Algorithms for a Digital Library Recommendation System
generally meta-data, so that documents on any specific subject can be transparently retrieved. While quality control can in principle still rely on the traditional methods of peer-...
Francis Heylighen, Johan Bollen
INFOCOM
2002
IEEE
15 years 10 months ago
Self-Verifying CSFQ
— Recently, a class of solutions including Core-Stateless Fair Queueing (CSFQ), Rainbow Fair Queueing, and Diffserv have been proposed to address the scalability concerns that ha...
Ion Stoica, Hui Zhang, Scott Shenker
177
Voted
MICRO
2002
IEEE
164views Hardware» more  MICRO 2002»
15 years 10 months ago
A quantitative framework for automated pre-execution thread selection
Pre-execution attacks cache misses for which conventional address-prediction driven prefetching is ineffective. In pre-execution, copies of cache miss computations are isolated fr...
Amir Roth, Gurindar S. Sohi
SSIAI
2002
IEEE
15 years 10 months ago
Active Contours for Cell Tracking
This paper introduces an active contour or snakebased method for tracking cells within a video sequence. Specifically, we apply our cell tracking techniques to rolling leukocytes ...
Nilanjan Ray, Scott T. Acton
SIGMETRICS
2010
ACM
214views Hardware» more  SIGMETRICS 2010»
15 years 9 months ago
Distributed sensor network localization from local connectivity: performance analysis for the HOP-TERRAIN algorithm
This paper addresses the problem of determining the node locations in ad-hoc sensor networks when only connectivity information is available. In previous work, we showed that the ...
Amin Karbasi, Sewoong Oh
« Prev « First page 3219 / 3369 Last » Next »