Sciweavers

2924 search results - page 555 / 585
» On the Use of Evidence in Neural Networks
Sort
View
ICDAR
2011
IEEE
14 years 1 months ago
Co-training for Handwritten Word Recognition
—To cope with the tremendous variations of writing styles encountered between different individuals, unconstrained automatic handwriting recognition systems need to be trained on...
Volkmar Frinken, Andreas Fischer, Horst Bunke, Ali...
INFOCOM
2008
IEEE
15 years 8 months ago
On the Levy-Walk Nature of Human Mobility
—We report that human walks performed in outdoor settings of tens of kilometers resemble a truncated form of Levy walks commonly observed in animals such as monkeys, birds and ja...
Injong Rhee, Minsu Shin, Seongik Hong, Kyunghan Le...
ACMACE
2006
ACM
15 years 7 months ago
An empirical evaluation of TCP performance in online games
A fundamental design question to ask in the development of a network game is—Which transport protocol should be used—TCP, UDP, or some other protocols? Seeking an objective an...
Kuan-Ta Chen, Chun-Ying Huang, Polly Huang, Chin-L...
COMCOM
2004
138views more  COMCOM 2004»
15 years 1 months ago
Issues with inferring Internet topological attributes
A number of recent studies of Internet network structure are based on data collected from inter-domain BGP routing tables and tools, such as traceroute, to probe end-to-end paths....
Lisa Amini, Anees Shaikh, Henning Schulzrinne
JNCA
2011
126views more  JNCA 2011»
14 years 8 months ago
Coordinated session-based admission control with statistical learning for multi-tier internet applications
Popular Internet applications deploy a multi-tier architecture, with each tier provisioning a certain functionality to its preceding tier. In this paper, we address the challengin...
Sireesha Muppala, Xiaobo Zhou