Sciweavers

1080 search results - page 18 / 216
» Performance analysis of the CONFIDANT protocol
Sort
View
118
Voted
ICDAR
2003
IEEE
15 years 9 months ago
Rejection Algorithm for Mis-segmented Characters In Multilingual Document Recognition
In OCR systems the character segmentation algorithm may generate mis-segmented blocks. Feedback information from character classifier is indispensable to achieve higher character ...
Zhengang Chen, Xiaoqing Ding
120
Voted
USENIX
2003
15 years 5 months ago
X Window System Network Performance
Performance was an important issue in the development of X from the initial protocol design and continues to be important in modern application and extension development. That X i...
Keith Packard, James Gettys
133
Voted
LCN
2006
IEEE
15 years 9 months ago
Performance Limits and Analysis of Contention-based IEEE 802.11 MAC
— Recent advance in IEEE 802.11 based standard has pushed the wireless bandwidth up to 600Mbps while keeping the same wireless medium access control (MAC) schemes for full backwa...
Shao-Cheng Wang, Ahmed Helmy
160
Voted
TRIDENTCOM
2008
IEEE
15 years 10 months ago
Performance analysis of a lightweight NEMO implementation for low-end devices
IETF Network Mobility (NEMO) Basic Support Protocol is an IP mobility management protocol designed to provide seamless IP mobility to complete networks. This protocol is of crucia...
J. L. Almodovar, Antonio de la Oliva, C. Lazo Ram,...
146
Voted
INFOCOM
2000
IEEE
15 years 8 months ago
A Performance Comparison Study of Ad Hoc Wireless Multicast Protocols
Abstract—In this paper we investigate the performance of multicast routing protocols in wireless mobile ad hoc networks. An ad hoc network is composed of mobile nodes without the...
Sung-Ju Lee, William Su, Julian Hsu, Mario Gerla, ...