Sciweavers

4360 search results - page 857 / 872
» Socio-technical systems: From design methods to systems engi...
Sort
View
CIT
2004
Springer
14 years 29 days ago
TCP Based Denial-of-Service Attacks to Edge Network: Analysis and Detection
End-to-end congestion control algorithms in TCP are designed for a highly co-operative environment with the assumption that the end hosts voluntarily participate in it and obey th...
V. Anil Kumar, Dorgham Sisalem
VCIP
2003
148views Communications» more  VCIP 2003»
13 years 9 months ago
Semantic transcoding of video based on regions of interest
Traditional transcoding on multimedia has been performed from the perspectives of user terminal capabilities such as display sizes and decoding processing power, and network resou...
Jeongyeon Lim, Munchurl Kim, Jong-Nam Kim, Kyeongs...
WCNC
2008
IEEE
14 years 1 months ago
Proportional Fair Scheduling: Analytical Insight under Rayleigh Fading Environment
—This paper provides analytical expressions to evaluate the performance of a random access wireless network in terms of user throughput and network throughput, subject to the con...
Erwu Liu, Kin K. Leung
INFOVIS
2003
IEEE
14 years 25 days ago
Exploring High-D Spaces with Multiform Matrices and Small Multiples
We introduce an approach to visual analysis of multivariate data that integrates several methods from information visualization, exploratory data analysis (EDA), and geovisualizat...
Alan M. MacEachren, Xiping Dai, Frank Hardisty, Di...
NIPS
2008
13 years 9 months ago
Breaking Audio CAPTCHAs
CAPTCHAs are computer-generated tests that humans can pass but current computer systems cannot. CAPTCHAs provide a method for automatically distinguishing a human from a computer ...
Jennifer Tam, Jirí Simsa, Sean Hyde, Luis v...