Sciweavers

755 search results - page 140 / 151
» Graph Transformation for Topology Modelling
Sort
View
AAIM
2006
Springer
129views Algorithms» more  AAIM 2006»
14 years 11 days ago
Secure Overlay Network Design
Due to the increasing security threats on the Internet, new overlay network architectures have been proposed to secure privileged services. In these architectures, the application...
Erran L. Li, Mohammad Mahdian, Vahab S. Mirrokni
PG
1997
IEEE
14 years 24 days ago
3D geometric metamorphosis based on harmonic map
Recently, animations with deforming objects are frequently used in various Computer Graphics applications. Metamorphosis (or morphing) of three dimensional objects is one of techn...
Takashi Kanai, Hiromasa Suzuki, Fumihiko Kimura
COMCOM
2006
100views more  COMCOM 2006»
13 years 8 months ago
Routing and wavelength assignment for core-based tree in WDM networks
In this paper, we address the routing and wavelength assignment problem for the core-based tree (CBT) service in a wavelength-division-multiplexing (WDM) network, where k sources ...
Jianping Wang, Xiangtong Qi, Mei Yang
ECAI
2004
Springer
14 years 2 months ago
Emergence of Complex Networks through Local Optimization
Abstract. The emergence of complex network structures of relationships between autonomous agents occurs in a wide range of distributed systems. Many researchers have proposed model...
Josep M. Pujol, Andreas Flache, Ramon Sangües...
INFOVIS
2003
IEEE
14 years 1 months ago
Visualizing Evolving Networks: Minimum Spanning Trees versus Pathfinder Networks
Network evolution is a ubiquitous phenomenon in a wide variety of complex systems. There is an increasing interest in statistically modeling the evolution of complex networks such...
Chaomei Chen, Steven Morris