Sciweavers

1411 search results - page 139 / 283
» Performance analysis of BitTorrent-like systems with heterog...
Sort
View
DIAL
2004
IEEE
170views Image Analysis» more  DIAL 2004»
14 years 1 months ago
A General System for the Retrieval of Document Images from Digital Libraries
Large collections of scanned documents (books and journals) are now available in Digital Libraries. The most common method for retrieving relevant information from these collectio...
Simone Marinai, Emanuele Marino, Francesca Cesarin...
FASE
2008
Springer
13 years 11 months ago
Automated Analysis of Permission-Based Security Using UMLsec
Abstract. To guarantee the security of computer systems, it is necessary to define security permissions to restrict the access to the systems' resources. These permissions enf...
Jan Jürjens, Jörg Schreck, Yijun Yu
CANDC
2009
ACM
14 years 4 months ago
A quantitative analysis of the collective creativity in playing 20-questions games
Creativity is an important ingredient in problem solving, and problem solving is an important activity for both individuals and societies. This paper discusses our novel approach ...
Wen Dong, Taemie Kim, Alex Pentland
ISCC
2007
IEEE
14 years 3 months ago
Cost Analysis of the MBMS Multicast Mode of UMTS
Along with the widespread deployment of the third generation cellular networks, the fast-improving capabilities of the mobile devices, content and service providers are increasing...
Antonios G. Alexiou, Christos Bouras, Evangelos Re...

Publication
767views
15 years 8 months ago
Analysis of the Increase/Decrease Algorithms for Congestion Avoidance in Computer Networks
Congestion avoidance mechanisms allow a network to operate in the optimal region of low delay and high throughput, thereby, preventing the network from becoming congested. This is ...
D. Chiu and R. Jain