Sciweavers

252 search results - page 26 / 51
» A Scenario-Based Approach to Protocol Design Using Evolution...
Sort
View
136
Voted
WSC
1997
15 years 4 months ago
Simulation of Modern Parallel Systems: A CSIM-based Approach
Components of modern parallel systems are becoming quite complex with many features and variations. An integrated modeling of these components (interconnection network, messaging ...
Dhabaleswar K. Panda, Debashis Basak, Donglai Dai,...
VTC
2006
IEEE
136views Communications» more  VTC 2006»
15 years 9 months ago
M3RP: Multi-rate/Multi-range Multicast Routing Protocol for Mobile Ad Hoc Networks
— Group Communication services have become more and more important in mobile ad hoc networks (MANETs). The use of multicast transmission techniques in MANETs has been shown to ha...
Jenhui Chen, Jhenjhong Guo, Chih-Chieh Wang
162
Voted
EC
2008
174views ECommerce» more  EC 2008»
15 years 3 months ago
Automated Design of Image Operators that Detect Interest Points
This work describes how evolutionary computation can be used to synthesize lowlevel image operators that detect interesting points on digital images. Interest point detection is a...
Leonardo Trujillo, Gustavo Olague
207
Voted
IHI
2012
353views Healthcare» more  IHI 2012»
13 years 11 months ago
Enhancing accountability of electronic health record usage via patient-centric monitoring
Electronic Health Record (EHR) and Personal Health Record (PHR) systems could allow patients to better manage their health information and share it to enhance the quality and effi...
Daisuke Mashima, Mustaque Ahamad
ICCCN
2008
IEEE
15 years 10 months ago
A Preliminary Look at the Privacy of SSH Tunnels
— Secure Shell (SSH) tunnels are commonly used to provide two types of privacy protection to clear-text application protocols. First and foremost, they aim at protecting the priv...
Maurizio Dusi, Francesco Gringoli, Luca Salgarelli