Sciweavers

4899 search results - page 940 / 980
» Robust normative systems
Sort
View
SENSYS
2009
ACM
14 years 3 months ago
The case for a network protocol isolation layer
Network protocols are typically designed and tested individually. In practice, however, applications use multiple protocols concurrently. This discrepancy can lead to failures fro...
Jung Il Choi, Maria A. Kazandjieva, Mayank Jain, P...
CCS
2009
ACM
14 years 3 months ago
As-awareness in Tor path selection
Tor is an anonymous communications network with thousands of router nodes worldwide. An intuition reflected in much of the literature on anonymous communications is that, as an a...
Matthew Edman, Paul F. Syverson
ICASSP
2009
IEEE
14 years 3 months ago
Multi-level non-rigid image registration using graph-cuts
Non-rigid image registration is widely used in medical image analysis and image processing. It remains a challenging research problem due to its smoothness requirement and high de...
Ronald W. K. So, Albert C. S. Chung
ICDAR
2009
IEEE
14 years 3 months ago
A Framework for Adaptation of the Active-DTW Classifier for Online Handwritten Character Recognition
: © A Framework for Adaptation of the Active-DTW Classifier for Online Handwritten Character Recognition Vandana Roy, Sriganesh Madhvanath, Anand S., Raghunath R. Sharma HP Labora...
Vandana Roy, Sriganesh Madhvanath, Anand S., Ragun...
P2P
2009
IEEE
122views Communications» more  P2P 2009»
14 years 3 months ago
Virtual Direction Routing for Overlay Networks
The enormous interest for peer-to-peer systems in recent years has prompted research into finding scalable and robust seeding and searching methods to support these overlay netwo...
Bow-Nan Cheng, Murat Yuksel, Shivkumar Kalyanarama...