Sciweavers

1945 search results - page 332 / 389
» Pursuit-Evasion in Models of Complex Networks
Sort
View
ICDM
2008
IEEE
156views Data Mining» more  ICDM 2008»
14 years 2 months ago
Exploiting Local and Global Invariants for the Management of Large Scale Information Systems
This paper presents a data oriented approach to modeling the complex computing systems, in which an ensemble of correlation models are discovered to represent the system status. I...
Haifeng Chen, Haibin Cheng, Guofei Jiang, Kenji Yo...
SIGECOM
2006
ACM
96views ECommerce» more  SIGECOM 2006»
14 years 2 months ago
Non-cooperative multicast and facility location games
We consider a multicast game with selfish non-cooperative players. There is a special source node and each player is interested in connecting to the source by making a routing de...
Chandra Chekuri, Julia Chuzhoy, Liane Lewin-Eytan,...
BMCBI
2008
211views more  BMCBI 2008»
13 years 8 months ago
CPSP-tools - Exact and complete algorithms for high-throughput 3D lattice protein studies
Background: The principles of protein folding and evolution pose problems of very high inherent complexity. Often these problems are tackled using simplified protein models, e.g. ...
Martin Mann, Sebastian Will, Rolf Backofen
VR
2010
IEEE
146views Virtual Reality» more  VR 2010»
13 years 6 months ago
Streaming 3D shape deformations in collaborative virtual environment
Collaborative virtual environment has been limited on static or rigid 3D models, due to the difficulties of real-time streaming of large amounts of data that is required to descri...
Ziying Tang, Guodong Rong, Xiaohu Guo, B. Prabhaka...
TELETRAFFIC
2007
Springer
14 years 2 months ago
Is ALOHA Causing Power Law Delays?
Abstract. Renewed interest in ALOHA-based Medium Access Control (MAC) protocols stems from their proposed applications to wireless ad hoc and sensor networks that require distribut...
Predrag R. Jelenkovic, Jian Tan