Sciweavers

6652 search results - page 1222 / 1331
» On the effective evaluation of TCP
Sort
View
WOWMOM
2005
ACM
129views Multimedia» more  WOWMOM 2005»
14 years 3 months ago
The Wireless Hierarchical Token Bucket: A Channel Aware Scheduler for 802.11 Networks
The paper proposes an architecture for a scheduling algorithm, to be integrated in IEEE 802.11 Access Points (AP), able to take into account, besides the transport service class r...
Rosario Giuseppe Garroppo, Stefano Giordano, Stefa...
CCS
2005
ACM
14 years 3 months ago
An auctioning reputation system based on anomaly
Existing reputation systems used by online auction houses do not address the concern of a buyer shopping for commodities—finding a good bargain. These systems do not provide in...
Shai Rubin, Mihai Christodorescu, Vinod Ganapathy,...
CIKM
2005
Springer
14 years 3 months ago
Maximal termsets as a query structuring mechanism
Search engines process queries conjunctively to restrict the size of the answer set. Further, it is not rare to observe a mismatch between the vocabulary used in the text of Web p...
Bruno Pôssas, Nivio Ziviani, Berthier A. Rib...
CP
2005
Springer
14 years 3 months ago
Speeding Up Constrained Path Solvers with a Reachability Propagator
Constrained path problems have to do with finding paths in graphs subject to constraints. One way of constraining the graph is by enforcing reachability on nodes. For instance, i...
Luis Quesada, Peter Van Roy, Yves Deville
CVBIA
2005
Springer
14 years 3 months ago
Analyzing Anatomical Structures: Leveraging Multiple Sources of Knowledge
Analysis of medical images, especially the extraction of anatomical structures, is a critical component of many medical applications: surgical planning and navigation, and populati...
W. Eric L. Grimson, Polina Golland
« Prev « First page 1222 / 1331 Last » Next »