Sciweavers

683 search results - page 75 / 137
» Vulnerability Analysis of High Dimensional Complex Systems
Sort
View
101
Voted
ISPASS
2005
IEEE
15 years 6 months ago
Analysis of Network Processing Workloads
Abstract— Network processing is becoming an increasingly important paradigm as the Internet moves towards an architecture with more complex functionality inside the network. Mode...
Ramaswamy Ramaswamy, Ning Weng, Tilman Wolf
116
Voted
ICPPW
2003
IEEE
15 years 6 months ago
Security Aspects of Wireless Heterogeneous Databases - Protocol, Performance, and Energy Analysis
Users have been demanding information “anytime, anywhere”. The notion of accessing diverse and autonomous information repositories with different APIs is not accepted. This ha...
Harshal Haridas, Ali R. Hurson, Yu Jiao
113
Voted
BMCBI
2006
123views more  BMCBI 2006»
15 years 22 days ago
SBEAMS-Microarray: database software supporting genomic expression analyses for systems biology
Background: The biological information in genomic expression data can be understood, and computationally extracted, in the context of systems of interacting molecules. The automat...
Bruz Marzolf, Eric W. Deutsch, Patrick Moss, David...
67
Voted
SRDS
2006
IEEE
15 years 6 months ago
Experimental Comparison of Local and Shared Coin Randomized Consensus Protocols
The paper presents a comparative performance study of the two main classes of randomized binary consensus protocols: a local coin protocol, with an expected high communication com...
Henrique Moniz, Nuno Ferreira Neves, Miguel Correi...
ICPR
2004
IEEE
16 years 1 months ago
Selecting Models from Videos for Appearance-Based Face Recognition
In this paper, we propose an unsupervised approach to select representative face samples (models) from raw videos and build an appearance-based face recognition system. The approa...
Abdenour Hadid, Matti Pietikäinen