Sciweavers

1131 search results - page 208 / 227
» Performance analysis of BSTs in system software
Sort
View
TDSC
2011
13 years 3 months ago
A Policy Enforcing Mechanism for Trusted Ad Hoc Networks
To ensure fair and secure communication in Mobile Ad hoc Networks (MANETs), the applications running in these networks must be regulated by proper communication policies. However,...
Gang Xu, Cristian Borcea, Liviu Iftode
SIGMETRICS
2004
ACM
124views Hardware» more  SIGMETRICS 2004»
14 years 2 months ago
Interposed proportional sharing for a storage service utility
This paper develops and evaluates new share-based scheduling algorithms for differentiated service quality in network services, such as network storage servers. This form of resou...
Wei Jin, Jeffrey S. Chase, Jasleen Kaur
CIVR
2009
Springer
229views Image Analysis» more  CIVR 2009»
14 years 3 months ago
A human-machine collaborative approach to tracking human movement in multi-camera video
Although the availability of large video corpora are on the rise, the value of these datasets remain largely untapped due to the difficulty of analyzing their contents. Automatic ...
Philip DeCamp, Deb Roy
CLEF
2006
Springer
14 years 16 days ago
University of Alicante at WiQA 2006
This paper presents the participation of University of Alicante at the WiQA pilot task organized as part of the CLEF 2006 campaign. For a given set of topics, this task presuppose...
Antonio Toral Ruiz, Georgiana Puscasu, Lorenza Mor...
CGO
2008
IEEE
14 years 3 months ago
Prediction and trace compression of data access addresses through nested loop recognition
This paper describes an algorithm that takes a trace (i.e., a sequence of numbers or vectors of numbers) as input, and from that produces a sequence of loop nests that, when run, ...
Alain Ketterlin, Philippe Clauss