Sciweavers

4761 search results - page 168 / 953
» Generalizing Boundary Points
Sort
View
106
Voted
IWIA
2005
IEEE
15 years 9 months ago
A General Cooperative Intrusion Detection Architecture for MANETs
1 Intrusion detection in MANETs is challenging because these networks change their topologies dynamically; lack concentration points where aggregated traffic can be analyzed; utili...
Daniel F. Sterne, Poornima Balasubramanyam, David ...
160
Voted
APWEB
2006
Springer
15 years 7 months ago
Generalized Projected Clustering in High-Dimensional Data Streams
Clustering is to identify densely populated subgroups in data, while correlation analysis is to find the dependency between the attributes of the data set. In this paper, we combin...
Ting Wang
115
Voted
QOFIS
2000
Springer
15 years 7 months ago
On the Feasibility of RSVP as General Signalling Interface
Much debate exists whether explicit signalling is eventually required to create a reliable and integrated multi-service Internet. If yes, further disagreement exists, how such sign...
Martin Karsten, Jens Schmitt, Nicole Beriér...
177
Voted
SGP
2007
15 years 6 months ago
Generalized surface flows for mesh processing
Geometric flows are ubiquitous in mesh processing. Curve and surface evolutions based on functional minimization have been used in the context of surface diffusion, denoising, sha...
Ilya Eckstein, Jean-Philippe Pons, Yiying Tong, C....
121
Voted
ISARCS
2010
156views Hardware» more  ISARCS 2010»
15 years 5 months ago
A Road to a Formally Verified General-Purpose Operating System
Methods of formal description and verification represent a viable way for achieving fundamentally bug-free software. However, in reality only a small subset of the existing operati...
Martin Decký