Sciweavers

501 search results - page 35 / 101
» Redundancy and Diversity in Security
Sort
View
NETWORK
2008
106views more  NETWORK 2008»
13 years 8 months ago
Toward internet-wide multipath routing
The Internet would be more efficient and robust if routers could flexibly divide traffic over multiple paths. Often, having one or two extra paths is sufficient for customizing pa...
Jiayue He, Jennifer Rexford
ICIP
2005
IEEE
14 years 9 months ago
Video coding with MC-EZBC and redundant-wavelet multihypothesis
Motion compensation with redundant-wavelet multihypothesis, in which multiple predictions that are diverse in transform phase contribute to a single motion estimate, is deployed i...
Joseph B. Boettcher, James E. Fowler
AINA
2009
IEEE
14 years 2 months ago
Quality Aware Context Information Aggregation System for Pervasive Environments
Sensing context information and making it available to the people, involved in coordinating a collaborative task, is a preliminary phase in making a system adaptable to the prevai...
Atif Manzoor, Hong Linh Truong, Schahram Dustdar
SAC
2009
ACM
14 years 2 months ago
Music retrieval based on a multi-samples selection strategy for support vector machine active learning
In active learning based music retrieval systems, providing multiple samples to the user for feedback is very necessary. In this paper, we present a new multi-samples selection st...
Tian-Jiang Wang, Gang Chen, Perfecto Herrera
AAAI
1996
13 years 9 months ago
Agent Cooperation Can Compensate For Agent Ignorance in Constraint Satisfaction
A team of constraint agents with diverse viewpoints canfind a solution to a constraint satisfaction problem (CSP) whenthe individual agents have an incomplete viewof the problem.I...
Peggy S. Eaton, Eugene C. Freuder