Sciweavers

365 search results - page 68 / 73
» Measurement-based Analysis of Networked System Availability
Sort
View
CIVR
2008
Springer
221views Image Analysis» more  CIVR 2008»
13 years 9 months ago
Annotation suggestion and search for personal multimedia objects on the web
The number of personal multimedia objects, such as digital photographs and videos, are exploding on the web through popular sites such as Flickr, YouTube, and FaceBook hosting bil...
Brendan Elliott, Z. Meral Özsoyoglu
SIGUCCS
2003
ACM
14 years 22 days ago
Higher education ERP: a framework to reduce the pain
Higher Education Institutions are now spending a significant portion of their budget to implement and maintain modern Enterprise Resource Planning (ERP) solutions. ERP is a softwa...
Kris T. Pegah, Mahmoud Pegah, Terry M. Dillow
AINA
2004
IEEE
13 years 11 months ago
Online Training of SVMs for Real-time Intrusion Detection
Abstract-- As intrusion detection essentially can be formulated as a binary classification problem, it thus can be solved by an effective classification technique-Support Vector Ma...
Zonghua Zhang, Hong Shen
BMCBI
2010
136views more  BMCBI 2010»
13 years 7 months ago
A hub-attachment based method to detect functional modules from confidence-scored protein interactions and expression profiles
Background: Many research results show that the biological systems are composed of functional modules. Members in the same module usually have common functions. This is useful inf...
Chia-Hao Chin, Shu-Hwa Chen, Chin-Wen Ho, Ming-Tat...
ICC
2007
IEEE
139views Communications» more  ICC 2007»
14 years 1 months ago
Impatient Backoff Algorithm: Fairness in a Distributed Ad-Hoc MAC
— Many distributed multiple access (MAC) protocols use an exponential backoff mechanism. In that mechanism, a node picks a random backoff time uniformly in an interval that doubl...
Rajarshi Gupta, Jean C. Walrand