Sciweavers

25 search results - page 4 / 5
» Compressed collections for simulated crawling
Sort
View
ACMSE
2006
ACM
14 years 3 months ago
Assessing denial of service vulnerabilities in DOCSIS
In previous work a DOCSIS model was added to ‘ns’ to allow simulations to be run to analyze the performance of DOCSIS. These simulations showed that congestion caused by the a...
Scott Moser, Jim Martin
SIGMETRICS
1998
ACM
14 years 2 months ago
Modeling Set Associative Caches Behavior for Irregular Computations
While much work has been devoted to the study of cache behavior during the execution of codes with regular access patterns, little attention has been paid to irregular codes. An i...
Basilio B. Fraguela, Ramon Doallo, Emilio L. Zapat...
ICVGIP
2008
13 years 11 months ago
Audio-Visual Person Authentication with Multiple Visualized-Speech Features and Multiple Face Profiles
We present an Audio-visual person authentication system which extracts several novel "VisualizedSpeech-Features" (VSF) from the spoken-password and multiple face profile...
Amitava Das, Ohil K. Manyam, Makarand Tapaswi
EJASP
2010
234views more  EJASP 2010»
13 years 4 months ago
Iterative Sparse Channel Estimation and Decoding for Underwater MIMO-OFDM
In this paper we propose a block-by-block iterative receiver for underwater MIMO-OFDM that couples channel estimation with MIMO detection and channel decoding. In particular, the c...
Jie Huang, Jianzhong Huang, Christian R. Berger, S...
ITCC
2002
IEEE
14 years 2 months ago
The Object Behavior of Java Object-Oriented Database Management Systems
Due to its portability and popularity for Internet applications, Java has become one of the major programming languages. The similar syntax inherited from the C language and the p...
Chia-Tien Dan Lo, J. Morris Chang, Ophir Frieder, ...