Sciweavers

1845 search results - page 271 / 369
» Computing the Angularity Tolerance
Sort
View
ICAC
2006
IEEE
14 years 4 months ago
Fast and Effective Worm Fingerprinting via Machine Learning
— As Internet worms become ever faster and more sophisticated, it is important to be able to extract worm signatures in an accurate and timely manner. In this paper, we apply mac...
Stewart M. Yang, Jianping Song, Harish Rajamani, T...
IPPS
2006
IEEE
14 years 4 months ago
Power-aware data dissemination protocols in wireless sensor networks
Recent rapid technological developments have led to the development of tiny, low-power, low-cost sensors. Such devices integrate sensing, limited data processing and communication...
Sotiris E. Nikoletseas
SIBGRAPI
2006
IEEE
14 years 4 months ago
Polygonization of volumetric reconstructions from silhouettes
In this work we propose a method for the polygonization of octree-based reconstructions by dual contouring. Dual contouring is an adaptive method for determining contiguous polygo...
Anselmo Antunes Montenegro, Luiz Velho, Paulo Ceza...
MOBICOM
2006
ACM
14 years 3 months ago
A MAC protocol for ad-hoc underwater acoustic sensor networks
A medium access control (MAC) protocol is proposed that is suitable for non-synchronized ad-hoc networks, and in particular for the energy-constrained underwater acoustic networks...
Borja Peleato, Milica Stojanovic
SAC
2006
ACM
14 years 3 months ago
Adaptive page-level incremental checkpointing based on expected recovery time
Incremental checkpointing, which is intended to minimize checkpointing overhead, saves only the modified pages of a process. This means that in incremental checkpointing, the time...
Sangho Yi, Junyoung Heo, Yookun Cho, Jiman Hong