Sciweavers

2060 search results - page 243 / 412
» Performability Evaluation of Networked Storage Systems Using...
Sort
View
ENC
2004
IEEE
14 years 28 days ago
A Method Based on Genetic Algorithms and Fuzzy Logic to Induce Bayesian Networks
A method to induce bayesian networks from data to overcome some limitations of other learning algorithms is proposed. One of the main features of this method is a metric to evalua...
Manuel Martínez-Morales, Ramiro Garza-Dom&i...
MOBIHOC
2003
ACM
14 years 8 months ago
SHORT: self-healing and optimizing routing techniques for mobile ad hoc networks
On demand routing protocols provide scalable and costeffective solutions for packet routing in mobile wireless ad hoc networks. The paths generated by these protocols may deviate ...
Chao Gui, Prasant Mohapatra
CVIU
2008
118views more  CVIU 2008»
13 years 9 months ago
Multimodal person authentication using speech, face and visual speech
This paper presents a method for automatic multimodal person authentication using speech, face and visual speech modalities. The proposed method uses the motion information to loc...
S. Palanivel, B. Yegnanarayana
ICNP
2006
IEEE
14 years 3 months ago
Vault: A Secure Binding Service
— Binding services are crucial building blocks in networks and networked applications. A binding service (e.g., the Domain Name System (DNS)) maps certain information, namely, bi...
Guor-Huar Lu, Changho Choi, Zhi-Li Zhang
SIGMOD
2008
ACM
109views Database» more  SIGMOD 2008»
14 years 9 months ago
Cooperative XPath caching
Motivated by the fact that XML is increasingly being used in distributed applications, we propose building a cooperative caching scheme for XML documents. Our scheme allows sharin...
Kostas Lillis, Evaggelia Pitoura