Sciweavers

4899 search results - page 863 / 980
» Robust normative systems
Sort
View
JUCS
2008
157views more  JUCS 2008»
13 years 10 months ago
Using Conjunctions and Adverbs for Author Verification
: Linguistics and stylistics have been investigated for author identification for quite a while, but recently, we have testified a impressive growth in the volume with which lawyer...
Daniel Pavelec, Luiz S. Oliveira, Edson J. R. Just...
MIS
2008
Springer
130views Multimedia» more  MIS 2008»
13 years 10 months ago
Adaptive and fuzzy approaches for nodes affinity management in wireless ad-hoc networks
In most of the ad-hoc routing protocols, a static link lifetime (LL) is used for a newly discovered neighbors. Though this works well for networks with fixed infrastructures, it is...
Essam Natsheh, Tat Chee Wan
JSAC
2006
199views more  JSAC 2006»
13 years 10 months ago
IDES: An Internet Distance Estimation Service for Large Networks
The responsiveness of networked applications is limited by communications delays, making network distance an important parameter in optimizing the choice of communications peers. S...
Yun Mao, Lawrence K. Saul, Jonathan M. Smith
MVA
2008
125views Computer Vision» more  MVA 2008»
13 years 10 months ago
Pearson-based mixture model for color object tracking
To track objects in video sequences, many studies have been done to characterize the target with respect to its color distribution. Most often, the Gaussian Mixture Model (GMM) is ...
William Ketchantang, Stéphane Derrode, Lion...
NETWORK
2008
106views more  NETWORK 2008»
13 years 10 months ago
Toward internet-wide multipath routing
The Internet would be more efficient and robust if routers could flexibly divide traffic over multiple paths. Often, having one or two extra paths is sufficient for customizing pa...
Jiayue He, Jennifer Rexford