Sciweavers

207 search results - page 39 / 42
» Detecting Bottleneck in n-Tier IT Applications Through Analy...
Sort
View
TON
2010
300views more  TON 2010»
13 years 5 months ago
POPI: a user-level tool for inferring router packet forwarding priority
— Packet forwarding prioritization (PFP) in routers is one of the mechanisms commonly available to network operators. PFP can have a significant impact on the accuracy of networ...
Guohan Lu, Yan Chen, Stefan Birrer, Fabián ...
IJRR
2008
136views more  IJRR 2008»
13 years 7 months ago
Image-based Visual Servoing with Central Catadioptric Cameras
: This paper presents an image-based visual servoing strategy for the autonomous navigation of a mobile holonomic robot from a current toward a desired pose, specified only through...
Gian Luca Mariottini, Domenico Prattichizzo
IVS
2008
121views more  IVS 2008»
13 years 7 months ago
Using treemaps for variable selection in spatio-temporal visualisation
We demonstrate and reflect upon the use of enhanced treemaps that incorporate spatial and temporal ordering for exploring a large multivariate spatio-temporal data set. The result...
Aidan Slingsby, Jason Dykes, Jo Wood
KDD
2007
ACM
136views Data Mining» more  KDD 2007»
14 years 7 months ago
Information genealogy: uncovering the flow of ideas in non-hyperlinked document databases
We now have incrementally-grown databases of text documents ranging back for over a decade in areas ranging from personal email, to news-articles and conference proceedings. While...
Benyah Shaparenko, Thorsten Joachims
MOBIHOC
2005
ACM
14 years 6 months ago
Least privilege and privilege deprivation: towards tolerating mobile sink compromises in wireless sensor networks
Mobile sinks are needed in many sensor network applications for efficient data collection, data querying, localized sensor reprogramming, identifying and revoking compromised sens...
Wensheng Zhang, Hui Song, Sencun Zhu, Guohong Cao