Sciweavers

1084 search results - page 121 / 217
» Optimal worm-scanning method using vulnerable-host distribut...
Sort
View
PDP
2008
IEEE
15 years 10 months ago
Internet-Scale Simulations of a Peer Selection Algorithm
The match between a peer-to-peer overlay and the physical Internet infrastructure is a constant issue. Time-constrained peer-to-peer applications such as live streaming systems ar...
Ali Boudani, Yiping Chen, Gilles Straub, Gwendal S...
EUROPAR
1999
Springer
15 years 8 months ago
I/O-Conscious Tiling for Disk-Resident Data Sets
This paper describes a tiling technique that can be used by application programmers and optimizing compilers to obtain I/O-efficient versions of regular scientific loop nests. Du...
Mahmut T. Kandemir, Alok N. Choudhary, J. Ramanuja...
IPPS
1998
IEEE
15 years 8 months ago
Jacobi Orderings for Multi-Port Hypercubes
1 The communication cost plays a key role in the performance of many parallel algorithms. In the particular case of the one-sided Jacobi method for symmetric eigenvalue and eigenve...
Dolors Royo, Antonio González, Miguel Valer...
IWNAS
2006
IEEE
15 years 10 months ago
Mobility Control with Local Views of Neighborhood in Mobile Networks
Recent work in mobile ad hoc networks, simply MANETs, has drawn attention to the mobility capability of each node. In [5], it is proved that the optimal positions of the relay nod...
Zhen Jiang, Jie Wu, Robert Kline
136
Voted
ICCV
1999
IEEE
15 years 8 months ago
Real-Time Object Detection for "Smart" Vehicles
This paper presents an e cient shape-based object detection method based on Distance Transforms and describes its use for real-time vision on-board vehicles. The method uses a tem...
Dariu Gavrila, Vasanth Philomin