Sciweavers

1414 search results - page 146 / 283
» Completion Energies and Scale
Sort
View
ICC
2007
IEEE
113views Communications» more  ICC 2007»
14 years 4 months ago
Spectral Analysis of TCP Flows for Defense Against Reduction-of-Quality Attacks
Abstract - The RoQ (Reduction-of-Quality) attacks are lowrate DDoS attacks that degrade the QoS to end systems stealthily but not to deny the services completely. These attacks are...
Yu Chen, Kai Hwang
SSDBM
2007
IEEE
138views Database» more  SSDBM 2007»
14 years 4 months ago
Reliable Hierarchical Data Storage in Sensor Networks
The ability to provide reliable in-network storage while balancing the energy consumption of individual sensors is a primary concern when deploying a sensor network. The main conc...
Song Lin, Benjamin Arai, Dimitrios Gunopulos
CASES
2003
ACM
14 years 3 months ago
Polynomial-time algorithm for on-chip scratchpad memory partitioning
Focusing on embedded applications, scratchpad memories (SPMs) look like a best-compromise solution when taking into account performance, energy consumption and die area. The main ...
Federico Angiolini, Luca Benini, Alberto Caprara
IFIP
2003
Springer
14 years 3 months ago
Power-Saving in Wi-Fi Hotspots: An Analytical Study
Wi-Fi hotspots are one of the most promising scenarios for mobile computing. In this scenario, a very limiting factor is the scarcity of mobile-device energetic resources. Both har...
Giuseppe Anastasi, Marco Conti, Enrico Gregori, An...
MICCAI
2001
Springer
14 years 2 months ago
Implicit Snakes: Active Constrained Implicit Models
Extended Abstract: We are exploring new techniques for active contour models (popularly known as “snakes”[1]) by combining active segmentation models with the constrained impli...
Terry S. Yoo, Kalpathi R. Subramanian