Sciweavers

641 search results - page 114 / 129
» Effective Change Detection Using Sampling
Sort
View
INFOCOM
2009
IEEE
14 years 3 months ago
Null Keys: Limiting Malicious Attacks Via Null Space Properties of Network Coding
—The performance of randomized network coding can suffer significantly when malicious nodes corrupt the content of the exchanged blocks. Previous work have introduced error corr...
Elias Kehdi, Baochun Li
CEC
2007
IEEE
14 years 3 months ago
Fingerprint analysis of the noisy prisoner's dilemma
Abstract— Fingerprinting is a technique that permits automatic classification of strategies for playing a game. In this study the evolution of strategies for playing the iterate...
Daniel A. Ashlock, Eun-Youn Kim, Wendy Ashlock
PCM
2005
Springer
119views Multimedia» more  PCM 2005»
14 years 2 months ago
Haptic Interaction with Depth Video Media
Abstract. In this paper we propose a touch enabled video player system. A conventional video player only allows viewers to passively experience visual and audio media. In virtual e...
Jongeun Cha, Seung Man Kim, Ian Oakley, Jeha Ryu, ...
OOPSLA
2004
Springer
14 years 2 months ago
The garbage collection advantage: improving program locality
As improvements in processor speed continue to outpace improvements in cache and memory speed, poor locality increasingly degrades performance. Because copying garbage collectors ...
Xianglong Huang, Stephen M. Blackburn, Kathryn S. ...
BMCBI
2006
146views more  BMCBI 2006»
13 years 9 months ago
A database application for pre-processing, storage and comparison of mass spectra derived from patients and controls
Background: Statistical comparison of peptide profiles in biomarker discovery requires fast, userfriendly software for high throughput data analysis. Important features are flexib...
Mark K. Titulaer, Ivar Siccama, Lennard J. Dekker,...