Sciweavers

425 search results - page 80 / 85
» On the additive constant of the k-server Work Function Algor...
Sort
View
MOBIHOC
2002
ACM
14 years 7 months ago
Comparison of broadcasting techniques for mobile ad hoc networks
Network wide broadcasting in Mobile Ad Hoc Networks provides important control and route establishment functionality for a number of unicast and multicast protocols. Considering i...
Brad Williams, Tracy Camp
TMA
2010
Springer
314views Management» more  TMA 2010»
14 years 2 months ago
On the Use of TCP Passive Measurements for Anomaly Detection: A Case Study from an Operational 3G Network
In this work we discuss the use of passive measurements of TCP performance indicators in support of network operation and troubleshooting, presenting a case-study from a real 3G ce...
Peter Romirer-Maierhofer, Angelo Coluccia, Tobias ...
ACMMSP
2004
ACM
131views Hardware» more  ACMMSP 2004»
14 years 1 months ago
Reuse-distance-based miss-rate prediction on a per instruction basis
Feedback-directed optimization has become an increasingly important tool in designing and building optimizing compilers. Recently, reuse-distance analysis has shown much promise i...
Changpeng Fang, Steve Carr, Soner Önder, Zhen...
COCO
2003
Springer
118views Algorithms» more  COCO 2003»
14 years 27 days ago
Lower bounds for predecessor searching in the cell probe model
We consider a fundamental problem in data structures, static predecessor searching: Given a subset S of size n from the universe [m], store S so that queries of the form “What i...
Pranab Sen
ECCV
2008
Springer
14 years 9 months ago
Multi-stage Contour Based Detection of Deformable Objects
We present an efficient multi stage approach to detection of deformable objects in real, cluttered images given a single or few hand drawn examples as models. The method handles de...
Saiprasad Ravishankar, Arpit Jain, Anurag Mittal