Sciweavers

25156 search results - page 4976 / 5032
» Applications for conscious systems
Sort
View
CGF
2008
84views more  CGF 2008»
13 years 7 months ago
Visualizing Underwater Ocean Optics
Simulating the in-water ocean light field is a daunting task. Ocean waters are one of the richest participating media, where light interacts not only with water molecules, but wit...
Diego Gutierrez, Francisco J. Serón, Adolfo...
CN
2008
117views more  CN 2008»
13 years 7 months ago
Broker-placement in latency-aware peer-to-peer networks
In large peer-to-peer (P2P) overlay networks, nodes usually share resources to support all kinds of applications. In such networks, a subset of the nodes may assume the role of br...
Pawel Garbacki, Dick H. J. Epema, Maarten van Stee...
CN
2008
127views more  CN 2008»
13 years 7 months ago
Decentralized detection of global threshold crossings using aggregation trees
The timely detection that a monitored variable has crossed a given threshold is a fundamental requirement for many network management applications. A challenge is the detection of ...
Fetahi Wuhib, Mads Dam, Rolf Stadler
COMCOM
2008
80views more  COMCOM 2008»
13 years 7 months ago
Robust video-on-demand streaming in peer-to-peer environments
This paper presents a new video-on-demand streaming technique in peer-to-peer (P2P) environments. While a number of P2P live video streaming techniques have been proposed in the p...
Tai T. Do, Kien A. Hua, Mounir A. Tantaoui
CORR
2010
Springer
175views Education» more  CORR 2010»
13 years 7 months ago
Detecting Security threats in the Router using Computational Intelligence
Information security is an issue of global concern. As the Internet is delivering great convenience and benefits to the modern society, the rapidly increasing connectivity and acc...
J. Visumathi, K. L. Shunmuganathan
« Prev « First page 4976 / 5032 Last » Next »