Sciweavers

4004 search results - page 89 / 801
» How Many Packets Can We Encode
Sort
View
102
Voted
CN
2002
116views more  CN 2002»
15 years 2 months ago
Avoiding congestion collapse on the Internet using TCP tunnels
This paper discusses the application of TCP tunnels on the Internet and how Internet traffic can benefit from the congestion control mechanism of the tunnels. Primarily, we show t...
Boon Peng Lee, Rajesh Krishna Balan, Lillykutty Ja...
119
Voted
LCN
2005
IEEE
15 years 8 months ago
ERP-DDRR: An Efficient and Robust Scheduler for Providing Proportional Delay Differentiation in Terabit Networks
In recent years, many research efforts focus on relative differentiated service due to the increasing requirements on quality of service for time-sensitive applications. Most of t...
Chin-Chi Wu, Hsien-Ming Wu, Ding-Jyh Tsaur, Woei L...
100
Voted
COMPUTER
2004
120views more  COMPUTER 2004»
15 years 2 months ago
Computer Security in the Real World
After thirty years of work on computer security, why are almost all the systems in service today extremely vulnerable to attack? The main reason is that security is expensive to s...
Butler W. Lampson
150
Voted
PAMI
2010
140views more  PAMI 2010»
15 years 1 months ago
Differential Geometric Inference in Surface Stereo
—Many traditional two-view stereo algorithms explicitly or implicitly use the frontal parallel plane assumption when exploiting contextual information since, e.g., the smoothness...
Gang Li, Steven W. Zucker
SMI
2005
IEEE
15 years 8 months ago
Maximizing Adaptivity in Hierarchical Topological Models
We present an approach to hierarchically encode the topology of functions over triangulated surfaces. We describe the topology of a function by its Morse-Smale complex, a well kno...
Peer-Timo Bremer, Valerio Pascucci, Bernd Hamann