Sciweavers

18451 search results - page 3567 / 3691
» Selecting the
Sort
View
JSAC
2006
105views more  JSAC 2006»
13 years 9 months ago
Network Topology Inference Based on End-to-End Measurements
Abstract--We consider using traceroute-like end-to-end measurement to infer the underlay topology for a group of hosts. One major issue is the measurement cost. Given hosts in an a...
Xing Jin, Wai-Pun Ken Yiu, S.-H. Gary Chan, Yajun ...
ENTCS
2007
116views more  ENTCS 2007»
13 years 9 months ago
Experiments in Cost Analysis of Java Bytecode
Recently, we proposed a general framework for the cost analysis of Java bytecode which can be used for measuring resource usage. This analysis generates, at compile-time, cost rel...
Elvira Albert, Puri Arenas, Samir Genaim, Germ&aac...
JSAC
2006
156views more  JSAC 2006»
13 years 9 months ago
Wormhole attacks in wireless networks
Abstract-- As mobile ad hoc network applications are deployed, security emerges as a central requirement. In this paper, we introduce the wormhole attack, a severe attack in ad hoc...
Yih-Chun Hu, Adrian Perrig, David B. Johnson
MMS
2008
13 years 9 months ago
Semantic interactive image retrieval combining visual and conceptual content description
We address the challenge of semantic gap reduction for image retrieval through an improved SVM-based active relevance feedback framework, together with a hybrid visual and concept...
Marin Ferecatu, Nozha Boujemaa, Michel Crucianu
ENVSOFT
2007
127views more  ENVSOFT 2007»
13 years 9 months ago
River model calibration, from guidelines to operational support tools
Numerical modelling is now used routinely to make predictions about the behaviour of environmental systems. Model calibration remains a critical step in the modelling process and ...
Jean-Philippe Vidal, Sabine Moisan, Jean-Baptiste ...
« Prev « First page 3567 / 3691 Last » Next »