Sciweavers

15251 search results - page 2790 / 3051
» Network Science - Theory and Application
Sort
View
ICCS
2007
Springer
15 years 10 months ago
Universal Execution of Parallel Processes: Penetrating NATs over the Grid
Today, clusters are very important computing resources and many computing centers manage their clusters in private networks. But parallel programs may not work in private clusters....
Insoon Jo, Hyuck Han, Heon Young Yeom, Ohkyoung Kw...
139
Voted
ICIC
2007
Springer
15 years 10 months ago
Unbalanced Underground Distribution Systems Fault Detection and Section Estimation
This paper presents a novel fault detection and section estimation method for unbalanced underground distribution systems (UDS). The method proposed is based on artificial neural n...
Karen Rezende Caino de Oliveira, Rodrigo Hartstein...
ISPEC
2007
Springer
15 years 10 months ago
An Economical Model for the Risk Evaluation of DoS Vulnerabilities in Cryptography Protocols
Denial of Service (DoS) attacks are a virulent type of attack on the availability of networks’ intended services and resources. Defense against DoS attacks has been built into th...
Zhen Cao, Zhi Guan, Zhong Chen, Jian-bin Hu, Liyon...
ISVC
2007
Springer
15 years 10 months ago
Skeleton-Based Data Compression for Multi-camera Tele-Immersion System
Abstract. Image-based full body 3D reconstruction for tele-immersive applications generates large amount of data points, which have to be sent through the network in real-time. In ...
Jyh-Ming Lien, Gregorij Kurillo, Ruzena Bajcsy
MIDDLEWARE
2007
Springer
15 years 10 months ago
Vector-Field Consistency for Ad-Hoc Gaming
Abstract. Developing distributed multiplayer games for ad-hoc networks is challenging. Consistency of the replicated shared state is hard to ensure at a low cost. Current consisten...
Nuno Santos, Luís Veiga, Paulo Ferreira
« Prev « First page 2790 / 3051 Last » Next »