Sciweavers

1039 search results - page 173 / 208
» The Def-inite Approach to Dependency Analysis
Sort
View
TON
2008
76views more  TON 2008»
13 years 9 months ago
Minimizing file download time in stochastic peer-to-peer networks
The peer-to-peer (P2P) file-sharing applications are becoming increasingly popular and account for more than 70% of the Internet's bandwidth usage. Measurement studies show th...
Yuh-Ming Chiu, Do Young Eun
MACOM
2010
13 years 8 months ago
Static Inter-Cell Interference Coordination Techniques for LTE Networks: A Fair Performance Assessment
Abstract. This paper focuses in the analysis of 100% static and distributed inter-cell interference coordination techniques in the context of LTE networks. Several methods have bee...
David González González, Mario Garc&...
PVLDB
2010
107views more  PVLDB 2010»
13 years 8 months ago
On Multi-Column Foreign Key Discovery
A foreign/primary key relationship between relational tables is one of the most important constraints in a database. From a data analysis perspective, discovering foreign keys is ...
Meihui Zhang, Marios Hadjieleftheriou, Beng Chin O...
ICPR
2010
IEEE
13 years 7 months ago
3D Vertebral Body Segmentation Using Shape Based Graph Cuts
Bone mineral density (BMD) measurements and fracture analysis of the spine bones are restricted to the Vertebral bodies (VBs). In this paper, we propose a novel 3D shape based met...
Melih S. Aslan, Asem M. Ali, Aly A. Farag, Ham M. ...
ICST
2009
IEEE
13 years 7 months ago
Putting Formal Specifications under the Magnifying Glass: Model-based Testing for Validation
A software development process is conceptually an abstract form of model transformation, starting from an enduser model of requirements, through to a system model for which code c...
Emine G. Aydal, Richard F. Paige, Mark Utting, Jim...