Sciweavers

834 search results - page 119 / 167
» Quantifying and Measuring Anonymity
Sort
View
ICPP
2002
IEEE
14 years 2 months ago
An Efficient Fault-Tolerant Scheduling Algorithm for Real-Time Tasks with Precedence Constraints in Heterogeneous Systems
In this paper, we investigate an efficient off-line scheduling algorithm in which real-time tasks with precedence constraints are executed in a heterogeneous environment. It provi...
Xiao Qin, Hong Jiang, David R. Swanson
INFOCOM
2002
IEEE
14 years 2 months ago
A Quantitative Assured Forwarding Service
— The Assured Forwarding (AF) service of the IETF DiffServ architecture provides a qualitative service differentiation between classes of traffic, in the sense that a low-priori...
Nicolas Christin, Jörg Liebeherr, Tarek F. Ab...
ISBI
2002
IEEE
14 years 2 months ago
ARMA modeling for estimation of permeability from perfusion MRI
We develop noninvasive MRI techniques that quantify the permeability of the Blood-Brain Barrier (BBB). Using such gadolinium compounds as Gd-DTPA and gadomer17, changes in R1 (R1 ...
Mohammad Mehdi Khalighi, Hamid Soltanian-Zadeh, Ja...
KDD
2009
ACM
179views Data Mining» more  KDD 2009»
14 years 2 months ago
A viewpoint-based approach for interaction graph analysis
Recent innovations have resulted in a plethora of social applications on the Web, such as blogs, social networks, and community photo and video sharing applications. Such applicat...
Sitaram Asur, Srinivasan Parthasarathy
COMPSAC
2000
IEEE
14 years 2 months ago
Firewall Security: Policies, Testing and Performance Evaluation
This paper explores the firewall security and performance relationship for distributed systems. Experiments are conducted to set firewall security into seven different levels and ...
Michael R. Lyu, Lorrien K. Y. Lau