Sciweavers

559 search results - page 89 / 112
» Dependency Inference
Sort
View
COMCOM
2008
95views more  COMCOM 2008»
13 years 7 months ago
CHESS: An application-aware space for enhanced scalable services in overlay networks
Abstract-- We introduce in this paper CHESS, an applicationaware space for enhanced scalable services in overlay networks. In this new space, the proximity of peers is determined a...
Mohammad Malli, Chadi Barakat, Walid Dabbous
CCR
2006
112views more  CCR 2006»
13 years 7 months ago
The probe gap model can underestimate the available bandwidth of multihop paths
The Probe Gap Model (PGM) was proposed as a lightweight and fast available bandwidth estimation method. Measurement tools such as Delphi and Spruce are based on PGM. Compared to e...
Li Lao, Constantine Dovrolis, M. Y. Sanadidi
IJCV
2008
188views more  IJCV 2008»
13 years 7 months ago
Partial Linear Gaussian Models for Tracking in Image Sequences Using Sequential Monte Carlo Methods
The recent development of Sequential Monte Carlo methods (also called particle filters) has enabled the definition of efficient algorithms for tracking applications in image sequen...
Elise Arnaud, Étienne Mémin
ENTCS
2007
89views more  ENTCS 2007»
13 years 7 months ago
Weak Probabilistic Anonymity
Abstract. Anonymity means that the identity of the user performing a certain action is maintained secret. The protocols for ensuring anonymity often use random mechanisms which can...
Yuxin Deng, Catuscia Palamidessi, Jun Pang
SCP
2008
86views more  SCP 2008»
13 years 7 months ago
Quantifying the yield of risk-bearing IT-portfolios
We proposed a method to quantify the yield of an IT-investment portfolio in an environment of uncertainty and risk. For various common implementation scenarios such as growing dem...
R. J. Peters, Chris Verhoef