Sciweavers

11949 search results - page 258 / 2390
» Some results on (a:b)-choosability
Sort
View
IWOCA
2009
Springer
149views Algorithms» more  IWOCA 2009»
15 years 8 months ago
Randomized Postoptimization of Covering Arrays
The construction of covering arrays with the fewest rows remains a challenging problem. Most computational and recursive constructions result in extensive repetition of coverage. W...
Peyman Nayeri, Charles J. Colbourn, Goran Konjevod
CBMS
2008
IEEE
15 years 8 months ago
Bridging the Gap: Enabling CBIR in Medical Applications
Content-based Image Retrieval (CBIR) for medical images has received a significant research interest over the past decade as a promising approach to address the data management ch...
Sameer Antani, L. Rodney Long, George R. Thoma
CNSR
2007
IEEE
15 years 8 months ago
Testing Intrusion Detection Systems in MANET: A Comprehensive Study
In this paper, we study the problem of testing Intrusion Detection Systems (IDS) in Mobile Ad hoc Networks (MANET). Testing is achieved by simulating different measurements. We mo...
Hadi Otrok, Joey Paquet, Mourad Debbabi, Prabir Bh...
SIES
2007
IEEE
15 years 8 months ago
Process Oriented Power Management
— Though modern operating systems have a capable of controlling the power consumption using the DVFS (Dynamic Voltage and Frequency Scaling) mechanism, it is controlled for some ...
Daisuke Miyakawa, Yutaka Ishikawa
ICDIM
2007
IEEE
15 years 7 months ago
Proposed secure mechanism for identification of ownership of undressed photographs or movies captured using camera based mobile
: Cameras attached to mobile phones are becoming more and more common, and as we move towards 3G and Next Generation Networks, it has become more a standard feature of mobile phone...
Samir B. Patel