Sciweavers

4688 search results - page 875 / 938
» Dynamics of Control
Sort
View
132
Voted
CN
2004
130views more  CN 2004»
15 years 2 months ago
The effect of bandwidth and buffer pricing on resource allocation and QoS
Congestion-based pricing of network resources is a common approach in evolving network architectures that support Quality of Service (QoS). Resource usage and QoS will thus fluctu...
Nan Jin, Scott Jordan
163
Voted
MICCAI
2010
Springer
15 years 15 days ago
Groupwise Registration by Hierarchical Anatomical Correspondence Detection
Groupwise registration has been widely investigated in recent years due to its importance in analyzing population data in many clinical applications. To our best knowledge, most o...
Guorong Wu, Qian Wang, Hongjun Jia, Dinggang Shen
137
Voted
TRIDENTCOM
2010
IEEE
15 years 13 days ago
G-Lab Deep: Cross-Layer Composition and Security for a Flexible Future Internet
The Internet enables the way how global businesses and communities communicate today. In the last years, however, new demands have collided with old designs, resulting in a complex...
Carsten Schmoll, Christian Henke, Dirk Hoffstadt, ...
140
Voted
NOCS
2007
IEEE
15 years 9 months ago
The Power of Priority: NoC Based Distributed Cache Coherency
The paper introduces Network-on-Chip (NoC) design methodology and low cost mechanisms for supporting efficient cache access and cache coherency in future high-performance Chip Mul...
Evgeny Bolotin, Zvika Guz, Israel Cidon, Ran Ginos...
136
Voted
SP
2010
IEEE
220views Security Privacy» more  SP 2010»
15 years 6 months ago
TaintScope: A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection
—Fuzz testing has proven successful in finding security vulnerabilities in large programs. However, traditional fuzz testing tools have a well-known common drawback: they are in...
Tielei Wang, Tao Wei, Guofei Gu, Wei Zou