Sciweavers

1737 search results - page 304 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
BMCBI
2007
200views more  BMCBI 2007»
13 years 10 months ago
BNDB - The Biochemical Network Database
Background: Technological advances in high-throughput techniques and efficient data acquisition methods have resulted in a massive amount of life science data. The data is stored ...
Jan Küntzer, Christina Backes, Torsten Blum, ...
ICMCS
2008
IEEE
206views Multimedia» more  ICMCS 2008»
14 years 4 months ago
Redundant motion vectors for improved error resilience in H.264/AVC coded video
This proposal presents a new error robust strategy for encoding redundant pictures for the H.264/AVC standard. The method is based on providing motion vectors as redundant data, i...
Maheshi B. Dissanayake, Chaminda T. E. R. Hewage, ...
GECCO
2007
Springer
185views Optimization» more  GECCO 2007»
14 years 4 months ago
An informed convergence accelerator for evolutionary multiobjective optimiser
A novel optimisation accelerator deploying neural network predictions and objective space direct manipulation strategies is presented. The concept of directing the search through ...
Salem F. Adra, Ian Griffin, Peter J. Fleming
AVSS
2005
IEEE
14 years 3 months ago
Integrating multi-camera tracking into a dynamic task allocation system for smart cameras
This paper reports on the integration of multi-camera tracking into an agent-based framework, which features autonomous task allocation for smart cameras targeting traffic survei...
Michael Bramberger, Markus Quaritsch, Thomas Winkl...
SECON
2007
IEEE
14 years 4 months ago
Fairness and Physical Layer Capture in Random Access Networks
Abstract— While physical layer capture has been observed in real implementations of wireless devices which randomly accessing shared channels, fair rate control algorithms based ...
Hoon Chang, Vishal Misra, Dan Rubenstein