Sciweavers

666 search results - page 38 / 134
» When Similar Problems Don't Have Similar Solutions
Sort
View
ICC
2008
IEEE
130views Communications» more  ICC 2008»
14 years 3 months ago
Managing Network Congestion with a Kohonen-Based RED Queue
— The behaviour of the TCP AIMD algorithm is known to cause queue length oscillations when congestion occurs at a router output link. Indeed, due to these queueing variations, en...
Emmanuel Lochin, Bruno Talavera
ICPR
2004
IEEE
14 years 10 months ago
Real-Time Face Detection Using Boosting in Hierarchical Feature Spaces
Boosting-basedmethods have recently led to the state-ofthe-art face detection systems. In these systems, weak classifiers to be boosted are based on simple, local, Haar-like featu...
Daniel Gatica-Perez, Dong Zhang, Stan Z. Li
SP
2008
IEEE
100views Security Privacy» more  SP 2008»
14 years 3 months ago
Towards Practical Privacy for Genomic Computation
Many basic tasks in computational biology involve operations on individual DNA and protein sequences. These sequences, even when anonymized, are vulnerable to re-identification a...
Somesh Jha, Louis Kruger, Vitaly Shmatikov
ISESE
2005
IEEE
14 years 2 months ago
Cloning by accident: an empirical study of source code cloning across software systems
One of the key goals of open source development is the sharing of knowledge, experience, and solutions that pertain to a software system and its problem domain. Source code clonin...
Raihan Al-Ekram, Cory Kapser, Richard C. Holt, Mic...
UAI
2003
13 years 10 months ago
Learning Module Networks
Methods for learning Bayesian networks can discover dependency structure between observed variables. Although these methods are useful in many applications, they run into computat...
Eran Segal, Dana Pe'er, Aviv Regev, Daphne Koller,...