Sciweavers

5410 search results - page 1064 / 1082
» When to Cross Over
Sort
View
IC3
2009
14 years 10 months ago
IDChase: Mitigating Identifier Migration Trap in Biological Databases
A convenient mechanism to refer to large biological objects such as sequences, structures and networks is the use of identifiers or handles, commonly called IDs. IDs function as a ...
Anupam Bhattacharjee, Aminul Islam, Hasan M. Jamil...
140
Voted
ICC
2009
IEEE
164views Communications» more  ICC 2009»
14 years 10 months ago
Policy-Based Security Configuration Management, Application to Intrusion Detection and Prevention
Intrusion Detection and/or Prevention Systems (IDPS) represent an important line of defense against the variety of attacks that can compromise the security and well functioning of...
Khalid Alsubhi, Issam Aib, Jérôme Fra...
110
Voted
ICCAD
2009
IEEE
135views Hardware» more  ICCAD 2009»
14 years 10 months ago
Enhanced reliability-aware power management through shared recovery technique
While Dynamic Voltage Scaling (DVS) remains as a popular energy management technique for real-time embedded applications, recent research has identified significant and negative i...
Baoxian Zhao, Hakan Aydin, Dakai Zhu
113
Voted
ICCV
2009
IEEE
14 years 10 months ago
BLOGS: Balanced local and global search for non-degenerate two view epipolar geometry
This work considers the problem of estimating the epipolar geometry between two cameras without needing a prespecified set of correspondences. It is capable of resolving the epipo...
Aveek S. Brahmachari, Sudeep Sarkar
ICEGOV
2009
ACM
14 years 10 months ago
A web-based performance monitoring system for e-government services
An e-Government portal represents not only a reputable public image of the sovereignty of a region, it is responsible for serving many users from local citizens and beyond, in a r...
Simon Fong, Ho Si Meng
« Prev « First page 1064 / 1082 Last » Next »