Sciweavers

1084 search results - page 173 / 217
» Optimal worm-scanning method using vulnerable-host distribut...
Sort
View
CORR
2008
Springer
86views Education» more  CORR 2008»
13 years 7 months ago
Capacity Regions and Bounds for a Class of Z-interference Channels
We define a class of Z-interference channels for which we obtain a new upper bound on the capacity region. The bound exploits a technique first introduced by Korner and Marton. A ...
Nan Liu, Andrea J. Goldsmith
ASPLOS
1996
ACM
13 years 12 months ago
Shasta: A Low Overhead, Software-Only Approach for Supporting Fine-Grain Shared Memory
This paper describes Shasta, a system that supports a shared address space in software on clusters of computers with physically distributed memory. A unique aspect of Shasta compa...
Daniel J. Scales, Kourosh Gharachorloo, Chandramoh...
SDM
2009
SIAM
176views Data Mining» more  SDM 2009»
14 years 4 months ago
Discovery of Geospatial Discriminating Patterns from Remote Sensing Datasets.
Large amounts of remotely sensed data calls for data mining techniques to fully utilize their rich information content. In this paper, we study new means of discovery and summariz...
Wei Ding 0003, Tomasz F. Stepinski, Josue Salazar
IJCV
2002
240views more  IJCV 2002»
13 years 7 months ago
Self-Calibration of Rotating and Zooming Cameras
In this paper we describe the theory and practice of self-calibration of cameras which are fixed in location and may freely rotate while changing their internal parameters by zoomi...
Lourdes de Agapito, Eric Hayman, Ian D. Reid
CIKM
2010
Springer
13 years 6 months ago
SHRINK: a structural clustering algorithm for detecting hierarchical communities in networks
Community detection is an important task for mining the structure and function of complex networks. Generally, there are several different kinds of nodes in a network which are c...
Jianbin Huang, Heli Sun, Jiawei Han, Hongbo Deng, ...