Sciweavers

294 search results - page 43 / 59
» Efficient Confirmer Signatures from the
Sort
View
JUCS
2007
112views more  JUCS 2007»
13 years 9 months ago
Internet Path Behavior Prediction via Data Mining: Conceptual Framework and Case Study
: In this paper we propose an application of data mining methods in the prediction of the availability and performance of Internet paths. We deploy a general decision-making method...
Leszek Borzemski
IAJIT
2010
230views more  IAJIT 2010»
13 years 8 months ago
An Unsupervised Artificial Neural Network Method for Satellite Image Segmentation
: Image segmentation is an essential step in image processing. The goal of segmentation is to simplify and/or to change the representation of an image into a form easier to analyze...
Mohamad Awad
CLOUDCOM
2010
Springer
13 years 7 months ago
REMEM: REmote MEMory as Checkpointing Storage
Checkpointing is a widely used mechanism for supporting fault tolerance, but notorious in its high-cost disk access. The idea of memory-based checkpointing has been extensively stu...
Hui Jin, Xian-He Sun, Yong Chen, Tao Ke
CONEXT
2010
ACM
13 years 7 months ago
Balancing throughput, robustness, and in-order delivery in P2P VoD
Peer-to-peer has emerged in recent years as a promising approach to providing Video-on-Demand streaming. The design space, however, is vast and still not well understood--yet choo...
Bin Fan, David G. Andersen, Michael Kaminsky, Kons...
ICCHP
2010
Springer
13 years 7 months ago
Improving Screen Magnification Using the HyperBraille Multiview Windowing Technique
Abstract. Screen magnification is an important means to support visually impaired people when working with computers. Many improvements have been made on appropriate software. But ...
Christiane Taras, Michael Raschke, Thomas Schlegel...