Sciweavers

2721 search results - page 466 / 545
» An experimental analysis of Lemke-Howson algorithm
Sort
View
EMSOFT
2007
Springer
14 years 1 months ago
Buffer optimization and dispatching scheme for embedded systems with behavioral transparency
Software components are modular and can enable post-deployment update, but their high overhead in runtime and memory is prohibitive for many embedded systems. This paper proposes ...
Jiwon Hahn, Pai H. Chou
SIGIR
2005
ACM
14 years 1 months ago
Title extraction from bodies of HTML documents and its application to web page retrieval
This paper is concerned with automatic extraction of titles from the bodies of HTML documents. Titles of HTML documents should be correctly defined in the title fields; however, i...
Yunhua Hu, Guomao Xin, Ruihua Song, Guoping Hu, Sh...
KDD
2004
ACM
198views Data Mining» more  KDD 2004»
14 years 1 months ago
Mining traffic data from probe-car system for travel time prediction
We are developing a technique to predict travel time of a vehicle for an objective road section, based on real time traffic data collected through a probe-car system. In the area ...
Takayuki Nakata, Jun-ichi Takeuchi
MMDB
2003
ACM
94views Multimedia» more  MMDB 2003»
14 years 29 days ago
Improving image retrieval effectiveness via multiple queries
Conventional approaches to image retrieval are based on the assumption that relevant images are physically near the query image in some feature space. This is the basis of the clu...
Xiangyu Jin, James C. French
IDEAL
2003
Springer
14 years 28 days ago
Detecting Distributed Denial of Service (DDoS) Attacks through Inductive Learning
As the complexity of Internet is scaled up, it is likely for the Internet resources to be exposed to Distributed Denial of Service (DDoS) flooding attacks on TCP-based Web servers....
Sanguk Noh, Cheolho Lee, Kyunghee Choi, Gihyun Jun...