Sciweavers

1998 search results - page 342 / 400
» A Hardware Implementation of PRAM and Its Performance Evalua...
Sort
View
JMM2
2007
117views more  JMM2 2007»
13 years 10 months ago
Image Segmentation using Multi-Coloured Active Illumination
— In this paper, the use of active illumination is extended to image segmentation, specifically in the case of overlapping particles. This work is based on Multi-Flash Imaging (M...
Tze Ki Koh, Nicholas Miles, Steve Morgan, Barrie H...
COMCOM
2004
79views more  COMCOM 2004»
13 years 10 months ago
Interdomain traffic engineering with redistribution communities
Various traffic engineering techniques are used to control the flow of IP packets inside large ISP networks. However, few techniques have been proposed to control the flow of pack...
Bruno Quoitin, Sébastien Tandel, Steve Uhli...
CORR
2002
Springer
93views Education» more  CORR 2002»
13 years 10 months ago
Secure History Preservation Through Timeline Entanglement
A secure timeline is a tamper-evident historic record of the states through which a system goes throughout its operational history. Secure timelines can help us reason about the t...
Petros Maniatis, Mary Baker
CN
1998
59views more  CN 1998»
13 years 9 months ago
Daisy: A Scalable All-Optical Packet Network with Multifiber Ring Topology
This paper presents Daisy, a scalable all-optical packet network where each node is equipped with one wavelength-tunable transmitter and one fixed-wavelength receiver. Network sca...
Marco Ajmone Marsan, Andrea Fumagalli, Emilio Leon...
IJMI
2002
82views more  IJMI 2002»
13 years 9 months ago
Protein names and how to find them
A prerequisite for all higher level information extraction tasks is the identication of unknown names in text. Today, when large corpora can consist of billions of words, it is of...
Kristofer Franzén, Gunnar Eriksson, Fredrik...