Sciweavers

350 search results - page 30 / 70
» A Component-Labeling Algorithm Using Contour Tracing Techniq...
Sort
View
CCR
2004
157views more  CCR 2004»
13 years 8 months ago
Designing BGP-based outbound traffic engineering techniques for stub ASes
Today, most multi-connected autonomous systems (AS) need to control the flow of their interdomain traffic for both performance and economical reasons. This is usually done by manu...
Steve Uhlig, Olivier Bonaventure
CCS
2007
ACM
14 years 15 days ago
Highly efficient techniques for network forensics
Given a history of packet transmissions and an excerpt of a possible packet payload, the payload attribution problem requires the identification of sources, destinations and the t...
Miroslav Ponec, Paul Giura, Hervé Brön...
DAGSTUHL
2008
13 years 10 months ago
A Note on Some Applications of Interval Arithmetic in Hierarchical Solid Modeling
Techniques of reliable computing, like interval arithmetic, can be used to guarantee reliable solutions even in the presence of numerical round-off errors. The need to trace bounds...
Eva Dyllong
CIMAGING
2009
265views Hardware» more  CIMAGING 2009»
13 years 9 months ago
Multi-object segmentation using coupled nonparametric shape and relative pose priors
We present a new method for multi-object segmentation in a maximum a posteriori estimation framework. Our method is motivated by the observation that neighboring or coupling objec...
Mustafa Gökhan Uzunbas, Octavian Soldea, M&uu...
SODA
2004
ACM
82views Algorithms» more  SODA 2004»
13 years 10 months ago
Dynamizing static algorithms, with applications to dynamic trees and history independence
We describe a machine model for automatically dynamizing static algorithms and apply it to historyindependent data structures. Static programs expressed in this model are dynamize...
Umut A. Acar, Guy E. Blelloch, Robert Harper, Jorg...