Sciweavers

50808 search results - page 326 / 10162
» A New
Sort
View
ISCC
2005
IEEE
116views Communications» more  ISCC 2005»
14 years 4 months ago
Link Buffer Sizing: A New Look at the Old Problem
We revisit the question of how much buffer an IP router should allocate for its Droptail FIFO link. For a long time, setting the buffer size to the bitrate-delay product has been ...
Sergey Gorinsky, Anshul Kantawala, Jonathan S. Tur...
NDSS
2005
IEEE
14 years 4 months ago
On a New Class of Pulsing Denial-of-Service Attacks and the Defense
In this paper we analyze a new class of pulsing denialof-service (PDoS) attacks that could seriously degrade the throughput of TCP flows. During a PDoS attack, periodic pulses of...
Xiapu Luo, Rocky K. C. Chang
IUI
2005
ACM
14 years 4 months ago
Multimodal new vocabulary recognition through speech and handwriting in a whiteboard scheduling application
Our goal is to automatically recognize and enroll new vocabulary in a multimodal interface. To accomplish this our technique aims to leverage the mutually disambiguating aspects o...
Edward C. Kaiser
MIR
2005
ACM
128views Multimedia» more  MIR 2005»
14 years 4 months ago
Content-based image retrieval: approaches and trends of the new age
The last decade has witnessed great interest in research on content-based image retrieval. This has paved the way for a large number of new techniques and systems, and a growing i...
Ritendra Datta, Jia Li, James Ze Wang
SAC
2005
ACM
14 years 4 months ago
Limited assignments: a new cutoff strategy for incomplete depth-first search
In this paper, we propose an extension of three incomplete depthfirst search techniques, namely depth-bounded backtrack search, credit search, and iterative broadening, towards pr...
Roman Barták, Hana Rudová
« Prev « First page 326 / 10162 Last » Next »