Sciweavers

53 search results - page 6 / 11
» Link Patterns for Modeling Information Grids and P2P Network...
Sort
View
ANSS
2004
IEEE
13 years 11 months ago
Normalizing Traffic Pattern with Anonymity for Mission Critical Applications
Intruders often want to analyze traffic pattern to get information for his some malicious activities in ultra-secure network. This paper presents a general approach to prevent tra...
Dongxi Liu, Chi-Hung Chi, Ming Li
DAWAK
2008
Springer
13 years 9 months ago
Mining Multidimensional Sequential Patterns over Data Streams
Sequential pattern mining is an active field in the domain of knowledge discovery and has been widely studied for over a decade by data mining researchers. More and more, with the ...
Chedy Raïssi, Marc Plantevit
NAS
2010
IEEE
13 years 6 months ago
CR: Capability Information for Routing of Wireless Ad Hoc Networks in the Real Environment
—In greedy routing, each relay node forwards the message to a neighbor (also called successor) that is closer to the destination. However, the successor candidate set (SCS) is di...
Zhen Jiang, Zhigang Li, Nong Xiao, Jie Wu
ICPR
2008
IEEE
14 years 9 months ago
Tracking of articulated pose and motion with a markerized grid suit
Despite leaps in motion capture technology, the dichotomy between unencumbered vision-based motion recovery and the prevailing marker-assisted motion capture solution remains larg...
Anthony C. Fang, Jayashree Karlekar, Sang N. Le
INFOCOM
2005
IEEE
14 years 1 months ago
Joint optimal scheduling and routing for maximum network throughput
— In this paper we consider packet networks loaded by admissible traffic patterns, i.e. by traffic patterns that, if optimally routed, do not overload network resources. In the...
Emilio Leonardi, Marco Mellia, Marco Ajmone Marsan...