Sciweavers

4250 search results - page 213 / 850
» Understanding the Requirements on Modelling Techniques
Sort
View
WISE
2002
Springer
14 years 3 months ago
An Update-Risk Based Approach to TTL Estimation in Web Caching
Web caching is an important technique for accelerating web applications and reducing the load on the web server and the network through local cache accesses. As in the traditional...
Jeong-Joon Lee, Kyu-Young Whang, Byung Suk Lee, Ji...
ICCV
1995
IEEE
14 years 2 months ago
Closed-World Tracking
A new approach to tracking weakly modeled objects in a semantically rich domain is presented. We define a closed-world as a space-time region of an image sequence in which the co...
Stephen S. Intille, Aaron F. Bobick
AHSWN
2006
206views more  AHSWN 2006»
13 years 10 months ago
Zone-Based Intrusion Detection for Mobile Ad Hoc Networks
ABSTRACT Intrusion Detection Systems (IDSs) for Mobile Ad hoc NETworks (MANETs) are indispensable since traditional intrusion prevention based techniques are not strong enough to p...
Bo Sun, Kui Wu, Udo W. Pooch
MA
2011
Springer
188views Communications» more  MA 2011»
13 years 5 months ago
A copula-based model of speculative price dynamics in discrete time
This paper suggests a new technique to construct first order Markov processes using products of copula functions, in the spirit of Darsow et al. (1992). The approach requires the...
Umberto Cherubini, Sabrina Mulinacci, Silvia Romag...
LREC
2008
113views Education» more  LREC 2008»
14 years 2 days ago
Automatic Rewriting of Patient Record Narratives
Patients require access to Electronic Patient Records, however medical language is often too difficult for patients to understand. Explaining records to patients is a time consumi...
Catalina Hallett, David Hardcastle