Sciweavers

6693 search results - page 1308 / 1339
» On an anytime algorithm for control
Sort
View
DMIN
2006
111views Data Mining» more  DMIN 2006»
13 years 9 months ago
Profiling and Clustering Internet Hosts
Identifying groups of Internet hosts with a similar behavior is very useful for many applications of Internet security control, such as DDoS defense, worm and virus detection, dete...
Songjie Wei, Jelena Mirkovic, Ezra Kissel
IADIS
2004
13 years 9 months ago
Constructing Scorm Compliant Course Based on High Level Petri Nets
With rapid development of the Internet, e-learning system has become more and more popular. Currently, to solve the issue of sharing and reusing of teaching materials in different...
Jun-Ming Su, Shian-Shyong Tseng, Chia-Yu Chen, Jui...
BILDMED
2003
176views Algorithms» more  BILDMED 2003»
13 years 9 months ago
Volumetric Meshes for Real-Time Medical Simulations
We present an approach to generating volumetric meshes from closed triangulated surface meshes. The approach initially generates a structured hexahedral mesh based on the bounding ...
Matthias Müller, Matthias Teschner
NETWORKING
2004
13 years 9 months ago
Fairness Issues in Bus-Based Optical Access Networks
Packet-based optical access ring is becoming a promising solution in metropolitan networks. Its performance depends mainly on how optical resource sharing takes place among the dif...
Nizar Bouabdallah, André-Luc Beylot, Guy Pu...
ICWN
2003
13 years 9 months ago
Providing Secondary Access in a Cellular Network
— Most wireless systems receive a license that gives them exclusive access to a block of spectrum. Exclusivity guarantees adequate quality of service, but it also leads to inefï¬...
Sooksan Panichpapiboon, Jon M. Peha
« Prev « First page 1308 / 1339 Last » Next »