Sciweavers

1511 search results - page 293 / 303
» On the effectiveness of address-space randomization
Sort
View
TMI
2008
92views more  TMI 2008»
13 years 7 months ago
Using Perturbation Theory to Compute the Morphological Similarity of Diffusion Tensors
Computing the morphological similarity of diffusion tensors (DTs) at neighboring voxels within a DT image, or at corresponding locations across different DT images, is a fundamenta...
Ravi Bansal, Lawrence H. Staib, Dongrong Xu, Andre...
TOG
2008
293views more  TOG 2008»
13 years 7 months ago
A perceptually validated model for surface depth hallucination
Capturing detailed surface geometry currently requires specialized equipment such as laser range scanners, which despite their high accuracy, leave gaps in the surfaces that must ...
Mashhuda Glencross, Gregory J. Ward, Francho Melen...
JSAC
2007
116views more  JSAC 2007»
13 years 7 months ago
Outreach: peer-to-peer topology construction towards minimized server bandwidth costs
Abstract— On-demand and live multimedia streaming applications (such as Internet TV) are well known to utilize a significant amount of bandwidth from media streaming servers, es...
Tara Small, Baochun Li, Ben Liang
JSAC
2007
263views more  JSAC 2007»
13 years 7 months ago
An Empirical Study of the Coolstreaming+ System
—In recent years, there has been significant interest in adopting the Peer-to-Peer (P2P) technology for Internet live video streaming. There are primarily two reasons behind thi...
Bo Li, Susu Xie, Gabriel Yik Keung, Jiangchuan Liu...
ALGORITHMICA
2004
111views more  ALGORITHMICA 2004»
13 years 7 months ago
Non-Clairvoyant Scheduling for Minimizing Mean Slowdown
We consider the problem of scheduling dynamically arriving jobs in a non-clairvoyant setting, that is, when the size of a job in remains unknown until the job finishes execution. ...
Nikhil Bansal, Kedar Dhamdhere, Jochen Könema...