Sciweavers

372 search results - page 31 / 75
» Trade-Off Results for Connection Management
Sort
View
ICA3PP
2005
Springer
14 years 4 months ago
Mining Traces of Large Scale Systems
Abstract— Large scale distributed computing infrastructure captures the use of high number of nodes, poor communication performance and continously varying resources that are not...
Christophe Cérin, Michel Koskas
CATA
2001
14 years 10 days ago
Eyelash detection model for accurate iris segmentation
In this paper, we present a novel eyelash detection model based on three criterions: 1) separable eyelash condition, 2) non-informative condition and 3) connective criterion. The f...
W. K. Kong, D. Zhang
CADE
2005
Springer
14 years 11 months ago
A Focusing Inverse Method Theorem Prover for First-Order Linear Logic
We present the theory and implementation of a theorem prover for first-order intuitionistic linear logic based on the inverse method. The central proof-theoretic insights underlyin...
Kaustuv Chaudhuri, Frank Pfenning
ESANN
1998
14 years 9 days ago
Speech recognition with a new hybrid architecture combining neural networks and continuous HMM
Abstract. In this paper, we focus on a novel NN/HMM architecture for continuous speech recognition. The architecture incorporates a neural feature extraction to gain more discrimin...
Daniel Willett, Gerhard Rigoll
CCR
2006
136views more  CCR 2006»
13 years 11 months ago
Traffic classification on the fly
The early detection of applications associated with TCP flows is an essential step for network security and traffic engineering. The classic way to identify flows, i.e. looking at...
Laurent Bernaille, Renata Teixeira, Ismael Akodken...