Sciweavers

2370 search results - page 381 / 474
» The Characterization of Data-Accumulating Algorithms
Sort
View
INFORMATICALT
2008
124views more  INFORMATICALT 2008»
14 years 9 months ago
Hierarchical Adaptive Clustering
This paper studies an adaptive clustering problem. We focus on re-clustering an object set, previously clustered, when the feature set characterizing the objects increases. We prop...
Gabriela Serban, Alina Campan
CN
2007
141views more  CN 2007»
14 years 9 months ago
Designing an overload control strategy for secure e-commerce applications
Uncontrolled overload can lead e-commerce applications to considerable revenue losses. For this reason, overload prevention in these applications is a critical issue. In this pape...
Jordi Guitart, David Carrera, Vicenç Beltra...
CN
2007
80views more  CN 2007»
14 years 9 months ago
A queueing analysis for the denial of service (DoS) attacks in computer networks
In most network security analysis, researchers mainly focus on qualitative studies on security schemes and possible attacks, and there are few papers on quantitative analysis in t...
Yang Wang, Chuang Lin, Quan-Lin Li, Yuguang Fang
IJCV
2006
119views more  IJCV 2006»
14 years 9 months ago
Hand Motion Gesture Frequency Properties and Multimodal Discourse Analysis
Gesture and speech are co-expressive and complementary channels of a single human language system. While speech carries the major load of symbolic presentation, gesture provides th...
Yingen Xiong, Francis K. H. Quek
JAIR
2008
123views more  JAIR 2008»
14 years 9 months ago
CTL Model Update for System Modifications
Model checking is a promising technology, which has been applied for verification of many hardware and software systems. In this paper, we introduce the concept of model update to...
Yan Zhang, Yulin Ding