Sciweavers

5410 search results - page 1064 / 1082
» When to Cross Over
Sort
View
IC3
2009
13 years 7 months ago
IDChase: Mitigating Identifier Migration Trap in Biological Databases
A convenient mechanism to refer to large biological objects such as sequences, structures and networks is the use of identifiers or handles, commonly called IDs. IDs function as a ...
Anupam Bhattacharjee, Aminul Islam, Hasan M. Jamil...
ICC
2009
IEEE
164views Communications» more  ICC 2009»
13 years 7 months ago
Policy-Based Security Configuration Management, Application to Intrusion Detection and Prevention
Intrusion Detection and/or Prevention Systems (IDPS) represent an important line of defense against the variety of attacks that can compromise the security and well functioning of...
Khalid Alsubhi, Issam Aib, Jérôme Fra...
ICCAD
2009
IEEE
135views Hardware» more  ICCAD 2009»
13 years 7 months ago
Enhanced reliability-aware power management through shared recovery technique
While Dynamic Voltage Scaling (DVS) remains as a popular energy management technique for real-time embedded applications, recent research has identified significant and negative i...
Baoxian Zhao, Hakan Aydin, Dakai Zhu
ICCV
2009
IEEE
13 years 7 months ago
BLOGS: Balanced local and global search for non-degenerate two view epipolar geometry
This work considers the problem of estimating the epipolar geometry between two cameras without needing a prespecified set of correspondences. It is capable of resolving the epipo...
Aveek S. Brahmachari, Sudeep Sarkar
ICEGOV
2009
ACM
13 years 7 months ago
A web-based performance monitoring system for e-government services
An e-Government portal represents not only a reputable public image of the sovereignty of a region, it is responsible for serving many users from local citizens and beyond, in a r...
Simon Fong, Ho Si Meng
« Prev « First page 1064 / 1082 Last » Next »