Sciweavers

5564 search results - page 952 / 1113
» Performance Modeling of HPC Applications
Sort
View
118
Voted
ICDM
2005
IEEE
190views Data Mining» more  ICDM 2005»
15 years 8 months ago
Neighborhood Formation and Anomaly Detection in Bipartite Graphs
Many real applications can be modeled using bipartite graphs, such as users vs. files in a P2P system, traders vs. stocks in a financial trading system, conferences vs. authors ...
Jimeng Sun, Huiming Qu, Deepayan Chakrabarti, Chri...
ICMCS
2005
IEEE
106views Multimedia» more  ICMCS 2005»
15 years 8 months ago
Adaptive Live Streaming Over Enterprise Networks
In this paper we present multimedia adaptation strategies for live video streams, at the streaming server, where we switch among several versions of the coded multimedia to match ...
Deepak S. Turaga, Ahmed Abd El Al, Chitra Venkatra...
118
Voted
ICNP
2005
IEEE
15 years 8 months ago
CONNET: Self-Controlled Access Links for Delay and Jitter Requirements
Access links are typically the bottleneck between a high bandwidth LAN and a high bandwidth IP network. Without a priori resource provisioning or reservation, this tends to have a...
Mohamed A. El-Gendy, Kang G. Shin, Hosam Fathy
101
Voted
MOBIQUITOUS
2005
IEEE
15 years 8 months ago
Multivariate Analysis for Probabilistic WLAN Location Determination Systems
WLAN location determination systems are gaining increasing attention due to the value they add to wireless networks. In this paper, we present a multivariate analysis technique fo...
Moustafa Youssef, Mohamed Abdallah
123
Voted
RTCSA
2005
IEEE
15 years 8 months ago
FPGA-Based Content Protection System for Embedded Consumer Electronics
We propose a new architecture for a content protection system that conceals confidential data and algorithms in an FPGA as electrical circuits. This architecture is designed for a...
Hiroyuki Yokoyama, Kenji Toda