Sciweavers

1080 search results - page 131 / 216
» Performance analysis of the CONFIDANT protocol
Sort
View
HPCA
2006
IEEE
15 years 10 months ago
Completely verifying memory consistency of test program executions
An important means of validating the design of commercial-grade shared memory multiprocessors is to run a large number of pseudo-random test programs on them. However, when intent...
Chaiyasit Manovit, Sudheendra Hangal
ICDAR
1999
IEEE
15 years 2 months ago
Partitioning and Searching Dictionary for Correction of Optically Read Devanagari Character Strings
Abstract. This paper describes a method for correction of optically read Devanagari character strings using a Hindi word dictionary. The word dictionary is partitioned in order to ...
Veena Bansal, R. M. K. Sinha
CIVR
2006
Springer
189views Image Analysis» more  CIVR 2006»
15 years 1 months ago
Automatic Person Annotation of Family Photo Album
Digital photographs are replacing tradition films in our daily life and the quantity is exploding. This stimulates the strong need for efficient management tools, in which the anno...
Ming Zhao 0003, Yong Teo, Siliang Liu, Tat-Seng Ch...
74
Voted
BMCBI
2010
160views more  BMCBI 2010»
14 years 10 months ago
Identification of functional hubs and modules by converting interactome networks into hierarchical ordering of proteins
Background: Protein-protein interactions play a key role in biological processes of proteins within a cell. Recent high-throughput techniques have generated protein-protein intera...
Young-Rae Cho, Aidong Zhang
HICSS
2009
IEEE
116views Biometrics» more  HICSS 2009»
15 years 4 months ago
Systems Modeling for IP-Based Handoff Using Timed Petri Nets
The mechanisms and design principles needed for achieving optimized handoff for mobile Internet services are poorly understood and need better analysis. This paper contributes to ...
Ashutosh Dutta, Bryan Lyles, Henning Schulzrinne, ...