Sciweavers

6187 search results - page 866 / 1238
» Practical Software Measurement
Sort
View
P2P
2008
IEEE
15 years 11 months ago
Faster Content Access in KAD
Many different Distributed Hash Tables (DHTs) have been designed, but only few have been successfully deployed. The implementation of a DHT needs to deal with practical aspects (e...
Moritz Steiner, Damiano Carra, Ernst W. Biersack
SISAP
2008
IEEE
175views Data Mining» more  SISAP 2008»
15 years 11 months ago
Anytime K-Nearest Neighbor Search for Database Applications
Many contemporary database applications require similarity-based retrieval of complex objects where the only usable knowledge of its domain is determined by a metric distance func...
Weijia Xu, Daniel P. Miranker, Rui Mao, Smriti R. ...
SRDS
2008
IEEE
15 years 11 months ago
An Empirical Study of Denial of Service Mitigation Techniques
We present an empirical study of the resistance of several protocols to denial of service (DoS) attacks on client-server communication. We show that protocols that use authenticat...
Gal Badishi, Amir Herzberg, Idit Keidar, Oleg Roma...
WIMOB
2008
IEEE
15 years 11 months ago
On the Energy Cost of Communication and Cryptography in Wireless Sensor Networks
Energy is a central concern in the deployment of wireless sensor networks. In this paper, we investigate the energy cost of cryptographic protocols, both from a communication and ...
Giacomo de Meulenaer, François Gosset, Fran...
ACIVS
2008
Springer
15 years 11 months ago
"Local Rank Differences" Image Feature Implemented on GPU
A currently popular trend in object detection and pattern recognition is usage of statistical classifiers, namely AdaBoost and its modifications. The speed performance of these cla...
Lukás Polok, Adam Herout, Pavel Zemcí...