Sciweavers

279 search results - page 33 / 56
» 20 Years of ECM
Sort
View
TRECVID
2008
13 years 8 months ago
Beyond Semantic Search: What You Observe May Not Be What You Think
This paper presents our approaches and results of the four TRECVID 2008 tasks we participated in: high-level feature extraction, automatic video search, video copy detection, and ...
Chong-Wah Ngo, Yu-Gang Jiang, Xiao-Yong Wei, Wanle...
WICSA
2004
13 years 8 months ago
Compositional Generation of Software Architecture Performance QN Models
Early performance analysis based on Queueing Network Models (QNM) has been often proposed to support software designers during the software development process. These approaches a...
Antinisca Di Marco, Paola Inverardi
WORM
2004
13 years 8 months ago
WORM vs. WORM: preliminary study of an active counter-attack mechanism
Self-propagating computer worms have been terrorizing the Internet for the last several years. With the increasing density, inter-connectivity and bandwidth of the Internet combin...
Frank Castaneda, Emre Can Sezer, Jun Xu
CCR
2008
75views more  CCR 2008»
13 years 7 months ago
Removing exponential backoff from TCP
The well-accepted wisdom is that TCP's exponential backoff mechanism, introduced by Jacobson 20 years ago, is essential for preserving the stability of the Internet. In this ...
Amit Mondal, Aleksandar Kuzmanovic
COMBINATORICA
2008
89views more  COMBINATORICA 2008»
13 years 7 months ago
The stable set polytope of quasi-line graphs
It is a long standing open problem to find an explicit description of the stable set polytope of clawfree graphs. Yet more than 20 years after the discovery of a polynomial algori...
Friedrich Eisenbrand, Gianpaolo Oriolo, Gautier St...