Sciweavers

2180 search results - page 321 / 436
» Performance analysis of concurrent systems with early evalua...
Sort
View
AIEDAM
2011
14 years 11 months ago
Discovering implicit constraints in design
In familiar design domains, expert designers are able to quickly focus on “good designs”, based on constraints they have learned while exploring the design space. This ability ...
Madan Mohan Dabbeeru, Amitabha Mukerjee
CIVR
2010
Springer
160views Image Analysis» more  CIVR 2010»
15 years 9 months ago
Today's and tomorrow's retrieval practice in the audiovisual archive
Content-based video retrieval is maturing to the point where it can be used in real-world retrieval practices. One such practice is the audiovisual archive, whose users increasing...
Bouke Huurnink, Cees G. M. Snoek, Maarten de Rijke...
WSC
2004
15 years 6 months ago
Fast Model-Based Penetration Testing
Traditional approaches to security evaluation have been based on penetration testing of real systems, or analysis of formal models of such systems. The former suffer from the prob...
Sankalp Singh, James Lyons, David M. Nicol
JDCTA
2010
172views more  JDCTA 2010»
14 years 11 months ago
Characterizing MEGACO Security in the presence Diameter Server
This paper analyzes performance of MEGACO (Media Gateway Control Protocol) based on Diameter which is an Authentication, Authorization,andAccounting (AAA) protocol developed withi...
Pedram Hajipour, Kolsoom Abbasi Shahkooh
IWMMDBMS
1998
91views more  IWMMDBMS 1998»
15 years 6 months ago
Q-L/MRP: A Buffer Management Mechanism for QoS Support in a Multimedia DBMS
Multimedia database systems (MMDBSs) have to be capable to handle efficiently time-dependent and timeindependent data, and to support Quality-of-Service (QoS). To support continuo...
Pål Halvorsen, Vera Goebel, Thomas Plagemann