Sciweavers

261 search results - page 40 / 53
» Differential constraints
Sort
View
SIGMETRICS
2006
ACM
102views Hardware» more  SIGMETRICS 2006»
14 years 1 months ago
NetQuest: a flexible framework for large-scale network measurement
Abstract—In this paper, we present NetQuest, a flexible framework for large-scale network measurement. We apply Bayesian experimental design to select active measurements that m...
Han Hee Song, Lili Qiu, Yin Zhang
JSAC
2007
180views more  JSAC 2007»
13 years 7 months ago
A Cross-Layer Approach for WLAN Voice Capacity Planning
— This paper presents an analytical approach to determining the maximum number of on/off voice flows that can be supported over a wireless local area network (WLAN), under a qua...
Yu Cheng, Xinhua Ling, Wei Song, Lin X. Cai, Weihu...
ICCV
2007
IEEE
14 years 9 months ago
Toward Reconstructing Surfaces With Arbitrary Isotropic Reflectance : A Stratified Photometric Stereo Approach
We consider the problem of reconstructing the shape of a surface with an arbitrary, spatially varying isotropic bidirectional reflectance distribution function (BRDF), and introdu...
Neil G. Alldrin, David J. Kriegman
IPMI
2005
Springer
14 years 8 months ago
A Riemannian Approach to Diffusion Tensor Images Segmentation
We address the problem of the segmentation of cerebral white matter structures from diffusion tensor images. Our approach is grounded on the theoretically well-founded differential...
Christophe Lenglet, Mikaël Rousson, Rachid De...
KDD
2002
ACM
144views Data Mining» more  KDD 2002»
14 years 7 months ago
ADMIT: anomaly-based data mining for intrusions
Security of computer systems is essential to their acceptance and utility. Computer security analysts use intrusion detection systems to assist them in maintaining computer system...
Karlton Sequeira, Mohammed Javeed Zaki