Sciweavers

879 search results - page 150 / 176
» Designing Closer to the Edge
Sort
View
JDCTA
2010
143views more  JDCTA 2010»
13 years 3 months ago
A Potent Model for Unwanted Traffic Detection in QoS Network Domain
Unwanted traffic injection which amplifies the traffic loading and exhausts network resources is counted as network security threat. Despite of the numerous protection systems, th...
Abdulghani Ali, Aman Jantan, Ghassan Ahmed Ali
MMAS
2011
Springer
13 years 3 months ago
A Multiscale Method for Epitaxial Growth
In this paper we investigate a heterogeneous multiscale method (HMM) for interface tracking and apply the technique to the simulation of epitaxial growth. HMM relies on an efficien...
Yi Sun, Russel Caflisch, Björn Engquist
CORR
2011
Springer
161views Education» more  CORR 2011»
13 years 17 days ago
A Panorama on Multiscale Geometric Representations, Intertwining Spatial, Directional and Frequency Selectivity
The richness of natural images makes the quest for optimal representations in image processing and computer vision challenging. The latter observation has not prevented the design...
Laurent Jacques, Laurent Duval, Caroline Chaux, Ga...
ICASSP
2011
IEEE
13 years 16 days ago
Content preference estimation in online social networks: Message passing versus sparse reconstruction on graphs
We design two different strategies for computing the unknown content preferences in an online social network based on a small set of nodes in the corresponding social graph for wh...
Jacob Chakareski
CCR
2011
13 years 11 days ago
Dynamically scaling applications in the cloud
Scalability is said to be one of the major advantages brought by the cloud paradigm and, more specifically, the one that makes it different to an “advanced outsourcing” solu...
Luis M. Vaquero, Luis Rodero-Merino, Rajkumar Buyy...