Sciweavers

34181 search results - page 6796 / 6837
» The Computer System GRAPHOGRAPH
Sort
View
MASCOTS
2008
13 years 11 months ago
Network Information Flow in Network of Queues
Two classic categories of models exist for computer networks: network information flow and network of queues. The network information flow model appropriately captures the multi-ho...
Phillipa Gill, Zongpeng Li, Anirban Mahanti, Jingx...
NETWORKING
2008
13 years 11 months ago
Designing Optimal iBGP Route-Reflection Topologies
The Border Gateway Protocol (BGP) is used today by all Autonomous Systems (AS) in the Internet. Inside each AS, iBGP sessions distribute the external routes among the routers. In l...
Marc-Olivier Buob, Steve Uhlig, Mickael Meulle
PDPTA
2008
13 years 11 months ago
A GridFTP Transport Driver for Globus XIO
GridFTP is a high-performance, reliable data transfer protocol optimized for high-bandwidth wide-area networks. Based on the Internet FTP protocol, it defines extensions for highp...
Rajkumar Kettimuthu, Wantao Liu, Joseph M. Link, J...
MVA
2007
230views Computer Vision» more  MVA 2007»
13 years 11 months ago
A Rear Vehicle Location Algorithm for Lane Change Assist
A monocular vision based location algorithm is presented to detect and track rear vehicles for lane change assist. The algorithm uses the shadow underneath the vehicle to extract ...
Wei Liu, Chunyan Song, Pengyu Fu, Nan Wang, Huai Y...
SNPD
2008
13 years 11 months ago
Effect of Security Increment to Symmetric Data Encryption through AES Methodology
The selective application of technological and related procedural safeguards is an important responsibility of every organization in providing adequate security to its electronic ...
Md. Nazrul Islam, Md. Monir Hossain Mia, Muhammad ...
« Prev « First page 6796 / 6837 Last » Next »