Sciweavers

1799 search results - page 315 / 360
» Active Objects in TMN
Sort
View
CORR
2010
Springer
166views Education» more  CORR 2010»
15 years 4 months ago
Software Metrics Evaluation Based on Entropy
Abstract. Software engineering activities in the Industry has come a long way with various improvements brought in various stages of the software development life cycle. The comple...
R. Selvarani, T. R. Gopalakrishnan Nair, Muthu Ram...
COMCOM
2008
100views more  COMCOM 2008»
15 years 4 months ago
Multicast algorithms in service overlay networks
Overlay routing has been proposed to enhance the reliability and performance of IP networks, since it can bypass congestion and transient outages by forwarding traffic through one ...
Dario Pompili, Caterina M. Scoglio, Luca Lopez
131
Voted
CORR
2010
Springer
135views Education» more  CORR 2010»
15 years 4 months ago
Fuzzy Aided Application Layer Semantic Intrusion Detection System - FASIDS
The objective of this is to develop a Fuzzy aided Application layer Semantic Intrusion Detection System (FASIDS) which works in the application layer of the network stack. FASIDS ...
S. Sangeetha, V. Vaidehi
CORR
2010
Springer
184views Education» more  CORR 2010»
15 years 4 months ago
Image Pixel Fusion for Human Face Recognition
In this paper we present a technique for fusion of optical and thermal face images based on image pixel fusion approach. Out of several factors, which affect face recognition perfo...
Mrinal Kanti Bhowmik, Debotosh Bhattacharjee, Mita...
AIR
2006
129views more  AIR 2006»
15 years 4 months ago
Attention driven reference resolution in multimodal contexts
In recent years a a number of psycholinguistic experiments have pointed to the interaction between language and vision. In particular, the interaction between visual attention and ...
John D. Kelleher