Sciweavers

2290 search results - page 344 / 458
» Extensible Protected Types
Sort
View
ICDM
2006
IEEE
158views Data Mining» more  ICDM 2006»
15 years 8 months ago
Detection of Interdomain Routing Anomalies Based on Higher-Order Path Analysis
Internet routing dynamics have been extensively studied in the past few years. However, dynamics such as interdomain Border Gateway Protocol (BGP) behavior are still poorly unders...
Murat Can Ganiz, Sudhan Kanitkar, Mooi Choo Chuah,...
151
Voted
ICPADS
2006
IEEE
15 years 8 months ago
On-line Evolutionary Resource Matching for Job Scheduling in Heterogeneous Grid Environments
In this paper, we describe a resource matcher (RM) developed for the on-line resource matching in heterogeneous grid environments. RM is based on the principles of Evolutionary Al...
Vijay K. Naik, Pawel Garbacki, Krishna Kummamuru, ...
IROS
2006
IEEE
146views Robotics» more  IROS 2006»
15 years 8 months ago
Adaptive Causal Models for Fault Diagnosis and Recovery in Multi-Robot Teams
— This paper presents an adaptive causal model method (adaptive CMM) for fault diagnosis and recovery in complex multi-robot teams. We claim that a causal model approach is effec...
Lynne E. Parker, Balajee Kannan
SUTC
2006
IEEE
15 years 8 months ago
DTTC: Delay-Tolerant Trajectory Compression for Object Tracking Sensor Networks
Taking advantage of the delay tolerance for objects tracking sensor networks, we propose delay-tolerant trajectory compression (DTTC) technique, an efficient and accurate algorit...
Yingqi Xu, Wang-Chien Lee
124
Voted
COMPGEOM
2006
ACM
15 years 8 months ago
The predicates for the Voronoi diagram of ellipses
This paper examines the computation of the Voronoi diagram of a set of ellipses in the Euclidean plane. We propose the first complete algorithms, under the exact computation para...
Ioannis Z. Emiris, Elias P. Tsigaridas, George M. ...