Sciweavers

490 search results - page 40 / 98
» Operations on Records
Sort
View
ICIP
1998
IEEE
14 years 9 months ago
Reversing Motion Vector Fields
With the popular use of digital video (VCD, DVD, video conferencing, digital broadcasting system, digital TV and video editing), video streaming technology becomes much more impor...
Susie J. Wee
SAC
2010
ACM
14 years 2 months ago
Implementing software product lines using traits
A software product line (SPL) is a set of software systems with well-defined commonalities and variabilities that are developed by managed reuse of common artifacts. In this pape...
Lorenzo Bettini, Ferruccio Damiani, Ina Schaefer
CPAIOR
2009
Springer
14 years 2 months ago
Modelling Search Strategies in Rules2CP
In this abstract, we present a rule-based modelling language for constraint programming, called Rules2CP [1], and a library PKML for modelling packing problems. Unlike other modell...
François Fages, Julien Martin
SIGCOMM
2004
ACM
14 years 1 months ago
Building a better NetFlow
Network operators need to determine the composition of the traffic mix on links when looking for dominant applications, users, or estimating traffic matrices. Cisco’s NetFlow ha...
Cristian Estan, Ken Keys, David Moore, George Varg...
CCS
2008
ACM
13 years 9 months ago
Mitigating DNS DoS attacks
This paper considers DoS attacks on DNS wherein attackers flood the nameservers of a zone to disrupt resolution of resource records belonging to the zone and consequently, any of ...
Hitesh Ballani, Paul Francis