Sciweavers

8486 search results - page 1663 / 1698
» Ordered Enumeration Method
Sort
View
CCR
2006
118views more  CCR 2006»
13 years 10 months ago
Tmix: a tool for generating realistic TCP application workloads in ns-2
In order to perform realistic network simulations, one needs a traffic generator that is capable of generating realistic synthetic traffic in a closed-loop fashion that "look...
Michele C. Weigle, Prashanth Adurthi, Félix...
COMCOM
2006
81views more  COMCOM 2006»
13 years 10 months ago
A case for tree evolution in QoS multicasting
The phenomenal growth of group communications and QoS-aware applications over the Internet have accelerated the development of multicasting technologies. The Core-Based Tree (CBT) ...
Anirban Chakrabarti, G. Manimaran
CONSTRAINTS
2006
105views more  CONSTRAINTS 2006»
13 years 10 months ago
Symmetry Breaking Constraints for Value Symmetries in Constraint Satisfaction
Constraint satisfaction problems (CSPs) sometimes contain both variable symmetries and value symmetries, causing adverse effects on CSP solvers based on tree search. As a remedy, s...
Y. Law, J. Lee
ENGL
2006
157views more  ENGL 2006»
13 years 10 months ago
Dealing with Acronyms in Biomedical Texts
Recently, there has been a growth in the amount of machine readable information pertaining to the biomedical field. With this growth comes a desire to be able to extract informati...
David B. Bracewell, Fuji Ren, Shingo Kuroiwa
IJCV
2008
223views more  IJCV 2008»
13 years 10 months ago
Robust Object Detection with Interleaved Categorization and Segmentation
This paper presents a novel method for detecting and localizing objects of a visual category in cluttered real-world scenes. Our approach considers object categorization and figure...
Bastian Leibe, Ales Leonardis, Bernt Schiele
« Prev « First page 1663 / 1698 Last » Next »