Sciweavers

2557 search results - page 335 / 512
» Real scaled matching
Sort
View
KBSE
2006
IEEE
15 years 10 months ago
A Portable Compiler-Integrated Approach to Permanent Checking
Program checking technology is now a mature technology, but is not yet used on a large scale. We identify one cause of this gap in the decoupling of checking tools from the everyd...
Eugen-Nicolae Volanschi
MMM
2006
Springer
154views Multimedia» more  MMM 2006»
15 years 10 months ago
A robust object shape prediction algorithm in the presence of white Gaussian noise
This paper presents a shape prediction algorithm in a noisy video sequence based on pixel representation in the undecimated wavelet domain. In our algorithm for tracking of user-d...
Mohammad Khansari, Hamid R. Rabiee, M. Asadi, M. G...
122
Voted
IWCMC
2006
ACM
15 years 10 months ago
Queuing network models for delay analysis of multihop wireless ad hoc networks
— In this paper we focus on characterizing the average end-to-end delay and maximum achievable per-node throughput in random access multihop wireless ad hoc networks with station...
Nabhendra Bisnik, Alhussein A. Abouzeid
HOTI
2005
IEEE
15 years 9 months ago
SIFT: Snort Intrusion Filter for TCP
Intrusion rule processing in reconfigurable hardware enables intrusion detection and prevention services to run at multi Gigabit/second rates. High-level intrusion rules mapped d...
Michael Attig, John W. Lockwood
IPPS
2005
IEEE
15 years 9 months ago
MOCCA - Towards a Distributed CCA Framework for Metacomputing
— We describe the design and implementation of MOCCA, a distributed CCA framework implemented using the H2O metacomputing system. Motivated by the quest for appropriate metasyste...
Maciej Malawski, Dawid Kurzyniec, Vaidy S. Sundera...