Sciweavers

1532 search results - page 50 / 307
» An analysis of additivity in OLAP systems
Sort
View
ICDAR
2009
IEEE
13 years 6 months ago
Evaluation of Different Strategies to Optimize an HMM-Based Character Recognition System
Different strategies for combination of complementary features in an HMM-based method for handwritten character recognition are evaluated. In addition, a noise reduction method is...
Murilo Santos, Albert Hung-Ren Ko, Luiz S. Oliveir...
DAC
1996
ACM
14 years 1 months ago
Opportunities and Obstacles in Low-Power System-Level CAD
A case study in low-power system-level design is presented. We detail the design of a low-power embedded system, a touchscreen interface device for a personal computer. This devic...
Andrew Wolfe
INFOCOM
1996
IEEE
14 years 1 months ago
Network Security via Reverse Engineering of TCP Code: Vulnerability Analysis and Proposed Solutions
The Transmission Control Protocol Internet Protocol TCP IP 1 suite is a very widely used technique that is employed to interconnect computing facilities in modern network environm...
Biswaroop Guha, Biswanath Mukherjee
EPEW
2006
Springer
13 years 11 months ago
Worst Case Analysis of Batch Arrivals with the Increasing Convex Ordering
We consider a finite buffer queue with one deterministic server fed by packets arriving in batches. We assume that we are not able to fully describe the batch distribution: only th...
Ana Busic, Jean-Michel Fourneau, Nihal Pekergin
CORR
2010
Springer
70views Education» more  CORR 2010»
13 years 9 months ago
Web Conferencing Traffic - An Analysis using DimDim as Example
In this paper, we present an evaluation of the Ethernet traffic for host and attendees of the popular opensource web conferencing system DimDim. While traditional Internet-centric...
Patrick Seeling