Sciweavers

3022 search results - page 497 / 605
» Make Way for WayMaker
Sort
View
CCR
2008
88views more  CCR 2008»
13 years 10 months ago
Rethinking virtual network embedding: substrate support for path splitting and migration
Network virtualization is a powerful way to run multiple architectures or experiments simultaneously on a shared infrastructure. However, making efficient use of the underlying re...
Minlan Yu, Yung Yi, Jennifer Rexford, Mung Chiang
CONSTRAINTS
2010
101views more  CONSTRAINTS 2010»
13 years 10 months ago
Constraint models for graceful graphs
Abstract. We present three constraint models of the problem of finding a graceful labelling of a graph, or proving that the graph is not graceful. An experimental comparison of the...
Barbara M. Smith, Jean-François Puget
CGF
2008
93views more  CGF 2008»
13 years 10 months ago
Local Volume Preservation for Skinned Characters
Generating plausible deformations of a character skin within the standard production pipeline is a challenge. This paper presents a volume preservation method dedicated to skinned...
Damien Rohmer, Stefanie Hahmann, Marie-Paule Cani
COMCOM
2008
138views more  COMCOM 2008»
13 years 10 months ago
Secure content access and replication in pure P2P networks
Despite the advantages offered by pure Peer-to-Peer (P2P) networks (e.g. robustness and fault tolerance), a crucial requirement is to guarantee basic security properties, such as ...
Esther Palomar, Juan M. Estévez-Tapiador, J...
CORR
2010
Springer
151views Education» more  CORR 2010»
13 years 10 months ago
Behavioural Correlation for Detecting P2P Bots
In the past few years, IRC bots, malicious programs which are remotely controlled by the attacker through IRC servers, have become a major threat to the Internet and users. These ...
Yousof Al-Hammadi, Uwe Aickelin