Sciweavers

438 search results - page 44 / 88
» On the Applicability of Knowledge Based NAT-Traversal for Ho...
Sort
View
TROB
2008
113views more  TROB 2008»
13 years 8 months ago
Occam's Razor Applied to Network Topology Inference
We present a method for inferring the topology of a sensor network given nondiscriminating observations of activity in the monitored region. This is accomplished based on no prior ...
Dimitri Marinakis, Gregory Dudek
TKDE
2011
176views more  TKDE 2011»
13 years 3 months ago
Experience Transfer for the Configuration Tuning in Large-Scale Computing Systems
—This paper proposes a new strategy, the experience transfer, to facilitate the management of large-scale computing systems. It deals with the utilization of management experienc...
Haifeng Chen, Wenxuan Zhang, Guofei Jiang
ATAL
2008
Springer
13 years 10 months ago
A 'companion' ECA with planning and activity modelling
In this paper, we describe the development of an Embodied Conversational Agent (ECA) implementing the concept of a companion, i.e. an agent supporting the persistent representatio...
Marc Cavazza, Cameron Smith, Daniel Charlton, Li Z...
CONEXT
2006
ACM
14 years 2 months ago
Shortcuts in a virtual world
We consider the case of a virtual world of peers that are organized in an overlay built by Delaunay Triangulation. Application layer routing is used to determine the path taken in...
Moritz Steiner, Ernst W. Biersack
ASUNAM
2011
IEEE
12 years 8 months ago
MultiAspectForensics: Pattern Mining on Large-Scale Heterogeneous Networks with Tensor Analysis
—Modern applications such as web knowledge base, network traffic monitoring and online social networks have made available an unprecedented amount of network data with rich type...
Koji Maruhashi, Fan Guo, Christos Faloutsos