Sciweavers

2838 search results - page 243 / 568
» Verifying Controlled Components
Sort
View
151
Voted

Publication
261views
16 years 11 months ago
Improving Explicit Congestion Notification with the Mark-Front Strategy
Delivering congestion signals is essential to the performance of networks. Current TCP/IP networks use packet losses to signal congestion. Packet losses not only reduces TCP perfor...
Chunlei Liu, Raj Jain,
CVPR
2009
IEEE
16 years 8 months ago
Unsupervised Learning for Graph Matching
Graph matching is an important problem in computer vision. It is used in 2D and 3D object matching and recognition. Despite its importance, there is little literature on learnin...
Marius Leordeanu, Martial Hebert
97
Voted
WWW
2005
ACM
16 years 1 months ago
Focused crawling by exploiting anchor text using decision tree
Focused crawlers are considered as a promising way to tackle the scalability problem of topic-oriented or personalized search engines. To design a focused crawler, the choice of s...
Jun Li, Kazutaka Furuse, Kazunori Yamaguchi
118
Voted
VLSID
2002
IEEE
152views VLSI» more  VLSID 2002»
16 years 1 months ago
Verification of an Industrial CC-NUMA Server
Directed test program-based verification or formal verification methods are usually quite ineffective on large cachecoherent, non-uniform memory access (CC-NUMA) multiprocessors b...
Rajarshi Mukherjee, Yozo Nakayama, Toshiya Mima
100
Voted
ESOP
2010
Springer
15 years 10 months ago
Enforcing Stateful Authorization and Information Flow Policies in Fine
Proving software free of security bugs is hard. Languages that ensure that programs correctly enforce their security policies would help, but, to date, no security-typed language h...
Nikhil Swamy, Juan Chen and Ravi Chugh