Sciweavers

128 search results - page 11 / 26
» Statistical Dialog Management Methodologies for Real Applica...
Sort
View
IH
2001
Springer
14 years 13 hour ago
Computational Forensic Techniques for Intellectual Property Protection
Computational forensic engineering (CFE) aims to identify the entity that created a particular intellectual property (IP). Rather than relying on watermarking content or designs, t...
Jennifer L. Wong, Darko Kirovski, Miodrag Potkonja...
INFOCOM
2011
IEEE
12 years 11 months ago
RelSamp: Preserving application structure in sampled flow measurements
—The Internet has significantly evolved in the number and variety of applications. Network operators need mechanisms to constantly monitor and study these applications. Given mo...
Myungjin Lee, Mohammad Y. Hajjat, Ramana Rao Kompe...
TON
2002
116views more  TON 2002»
13 years 7 months ago
Managing capacity for telecommunications networks under uncertainty
The existing telecommunications infrastructure in most of the world is adequate to deliver voice and text applications, but demand for broadband services such as streaming video an...
Yann d'Halluin, Peter A. Forsyth, Kenneth R. Vetza...
GECCO
2007
Springer
138views Optimization» more  GECCO 2007»
14 years 1 months ago
Implementation issues for an interactive evolutionary computation system
The design and development of an Interactive Evolutionary Computation (IEC) system needs to take into account the implementation issues found when delivering the system to “Real...
Mark R. N. Shackelford
SIGMOD
2007
ACM
195views Database» more  SIGMOD 2007»
14 years 7 months ago
Effective variation management for pseudo periodical streams
Many database applications require the analysis and processing of data streams. In such systems, huge amounts of data arrive rapidly and their values change over time. The variati...
Lv-an Tang, Bin Cui, Hongyan Li, Gaoshan Miao, Don...