Sciweavers

2006 search results - page 316 / 402
» Heuristic Security-Testing Methods
Sort
View
FGR
2006
IEEE
147views Biometrics» more  FGR 2006»
14 years 3 months ago
Learning Sparse Features in Granular Space for Multi-View Face Detection
In this paper, a novel sparse feature set is introduced into the Adaboost learning framework for multi-view face detection (MVFD), and a learning algorithm based on heuristic sear...
Chang Huang, Haizhou Ai, Yuan Li, Shihong Lao
ISCC
2006
IEEE
14 years 3 months ago
An Optimized Peer-to-Peer Overlay Network for Service Discovery
In this paper, we propose DINPeer, an optimized peer-to-peer (P2P) overlay network for service discovery by overcoming limitations in current multicast discovery approaches and P2...
H. Q. Guo, D. Q. Zhang, Lek Heng Ngoh, Wai-Choong ...
ISCC
2006
IEEE
133views Communications» more  ISCC 2006»
14 years 3 months ago
Choosing Weights for IP Network Dimensioning Optimization
Often in Internet Protocol (IP) networks, links are assigned weights, and traffic demands are routed along shortest paths. Hence, these link weights are the parameters which dete...
Olivier Klopfenstein, Sebastien Mamy
ISORC
2006
IEEE
14 years 3 months ago
Automatic Memory Management in Utility Accrual Scheduling Environments
Convenience, reliability, and effectiveness of automatic memory management have long been established in modern systems and programming languages such as Java. The timeliness req...
Shahrooz Feizabadi, Godmar Back
RTCSA
2006
IEEE
14 years 3 months ago
Maximizing Guaranteed QoS in (m, k)-firm Real-time Systems
(m,k)-firm constraints have been used to schedule tasks in soft/firm real-time systems under overloaded conditions. In general, they are provided by application designers to guara...
Jian (Denny) Lin, Albert M. K. Cheng