Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
This paper proposes an interactive change detection method in multitemporal remote sensing images. The user needs to input markers related to change and no-change classes in the Difference image. Then this information is used by a support vector machine classifier to generate a spectral-change map. Then two different solutions based on Markov Random Field or Level-Set methods are used to incorporate...
Multi-core architectures are commonly used for network applications because the workload is highly parallelizable. Packet scheduling is a critical performance component of these applications and significantly impacts how well they scale. Deep packet inspection (DPI) applications are more complex than most network applications. This makes packet scheduling more difficult, but it can have a larger impact...
The misuse of identity-related information in cyberspace is one of the biggest concerns among all Internet users. So far several technologies have been proposed and implemented to prevent and detect identity theft and misuse, but none of them are completely successful in terms of privacy, user-centricity and generality. In this paper, we identify the requirements for a user-centric identity-usage...
A growing class of applications, including VoIP, IM and presence, are enabled by the session initiation protocol (SIP). Requests in SIP typically traverse through multiple proxies. The availability of multiple proxies offers the flexibility to distribute proxy functionality across several nodes. In particular, after experimentally demonstrating that the resource consumption of maintaining state is...
Reputation systems provide a promising way for building trust through social control in collaborative communities by harnessing the community knowledge in the form of feedback. However, reputation systems also introduce vulnerabilities due to potential manipulations by dishonest or malicious players. In this paper, we focus on two closely related problems - feedback sparsity and potential feedback...
This paper explores the application of visualization techniques to aid in the analysis of malicious and non-malicious binary objects. These objects may include any logically distinct chunks of binary data such as image files, word processing documents and network packets. To facilitate this analysis, we present a novel visualization technique for comparing and navigating among 600-1000+ such objects...
Heterogeneous users usually have different requirements as far as consistency of shared data is concerned. This paper proposes and investigates a mixed consistency model to meet this heterogeneity challenge in large scale distributed systems that support shared objects. This model allows combining strong (sequential) consistency and weak (causal) consistency. The paper defines the model, motivates...
The open nature of peer-to-peer systems has played an important role in their growing popularity. The current file-sharing applications, for instance, have been widely used largely because they allow anyone to participate in them. This openness, however, brings up new issues because selfish, malicious, faulty, compromised, or resource-constrained peers may degrade a system. The authors explored the...
As computers become pervasive in environments like the home and community, data repositories that can maintain the long term state of applications will become increasingly important. Because of the greater reliance of people on such applications and the potentially sensitive nature of the data manipulated by them, the repository must be highly available and it should provide secure access to data...
Presents the Remote Attribute Virtual Environment Library (RAVEL), a support system for the development and implementation of distributed, multi-user virtual environment (VE) applications. The system extends earlier work in low-latency communication between sub-task processes of an application to provide communication of arbitrary environment attribute information between tasks, independent of the...
Background: The high proportion of gastric carcinomas present in an unresectable stage, together with the emergence of multimodal treatments, increases the usefulness of objective staging methods that avoid unnecessary laparotomies. Methods: A prospective evaluation of the accuracy of laparoscopy in the staging of 71 patients with gastric adenocarcinoma is presented. Serosal infiltration, retroperitoneal...
Background: The high proportion of gastric carcinomas present in an unresectable stage, together with the emergence of multimodal treatments, increases the usefulness of objective staging methods that avoid unnecessary laparotomies. Methods: A prospective evaluation of the accuracy of laparoscopy in the staging of 71 patients with gastric adenocarcinoma is presented. Serosal infiltration, retroperitoneal...
In systems that support disconnected operations, shared objects must be cached at client sites to ensure that the objects are accessible while the client is disconnected. It is desirable that objects cached at a client site are mutually consistent with respect to the level of consistency provided by the system. We present a new technique for detecting mutual consistency of objects and show how it...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.