Sciweavers

657 search results - page 81 / 132
» A performance study of RSVP with proposed extensions
Sort
View
INFOCOM
2007
IEEE
14 years 2 months ago
VoIP on Wireless Meshes: Models, Algorithms and Evaluation
—We study the problem of supporting VoIP calls in a wireless mesh network. Specifically, we propose solutions for call admission control (CAC) and route selection for VoIP calls...
Anand Kashyap, Samrat Ganguly, Samir R. Das, Suman...
IPPS
2005
IEEE
14 years 1 months ago
Predicting Cache Space Contention in Utility Computing Servers
The need to provide performance guarantee in high performance servers has long been neglected. Providing performance guarantee in current and future servers is difficult because ...
Yan Solihin, Fei Guo, Seongbeom Kim
SDM
2012
SIAM
340views Data Mining» more  SDM 2012»
11 years 10 months ago
IntruMine: Mining Intruders in Untrustworthy Data of Cyber-physical Systems
A Cyber-Physical System (CPS) integrates physical (i.e., sensor) devices with cyber (i.e., informational) components to form a situation-aware system that responds intelligently t...
Lu An Tang, Quanquan Gu, Xiao Yu, Jiawei Han, Thom...
ICIP
2008
IEEE
14 years 9 months ago
Using disparity for quality assessment of stereoscopic images
3DTV has been widely studied these last years from a technical point of view but the related quality evaluations does not follow this enthusiasm. This article reviews the quality ...
Alexandre Benoit, Patrick Le Callet, Patrizio Camp...
ICDE
2008
IEEE
154views Database» more  ICDE 2008»
14 years 9 months ago
Butterfly: Protecting Output Privacy in Stream Mining
Abstract-- Privacy preservation in data mining demands protecting both input and output privacy. The former refers to sanitizing the raw data itself before performing mining. The l...
Ting Wang, Ling Liu