Sciweavers

5055 search results - page 919 / 1011
» Relative Timing
Sort
View
CP
2005
Springer
15 years 5 months ago
2-Way vs. d-Way Branching for CSP
Abstract. Most CSP algorithms are based on refinements and extensions of backtracking, and employ one of two simple “branching schemes”: 2-way branching or d-way branching, fo...
Joey Hwang, David G. Mitchell
ERCIMDL
2005
Springer
80views Education» more  ERCIMDL 2005»
15 years 5 months ago
Strategies for Reprocessing Aggregated Metadata
The OAI protocol facilitates the aggregation of large numbers of heterogeneous metadata records. In order to make harvested records useable in the context of an OAI service provide...
Muriel Foulonneau, Timothy W. Cole
GFKL
2005
Springer
117views Data Mining» more  GFKL 2005»
15 years 5 months ago
A Cross-cultural Evaluation Framework for Behavioral Biometric User Authentication
Today biometric techniques are based either on passive (e.g. IrisScan, Face) or active methods (e.g. voice and handwriting). In our work we focus on evaluation of the latter. These...
Franziska Wolf, T. K. Basu, Pranab K. Dutta, Claus...
ICN
2005
Springer
15 years 5 months ago
Load Distribution Performance of the Reliable Server Pooling Framework
Abstract. The Reliable Server Pooling (RSerPool) protocol suite currently under standardization by the IETF is designed to build systems providing highly available services by prov...
Thomas Dreibholz, Erwin P. Rathgeb, Michael Tü...
LCPC
2005
Springer
15 years 5 months ago
Optimizing Packet Accesses for a Domain Specific Language on Network Processors
Programming network processors remains a challenging task since their birth until recently when high-level programming environments for them are emerging. By employing domain speci...
Tao Liu, Xiao-Feng Li, Lixia Liu, Chengyong Wu, Ro...