Sciweavers

5215 search results - page 958 / 1043
» Quantum clustering algorithms
Sort
View
122
Voted
IJDSN
2006
136views more  IJDSN 2006»
15 years 3 months ago
Intrusion Detection for Routing Attacks in Sensor Networks
Security is a critical challenge for creating robust and reliable sensor networks. For example, routing attacks have the ability to disconnect a sensor network from its central ba...
Chong Eik Loo, Mun Yong Ng, Christopher Leckie, Ma...
170
Voted
IJVR
2006
166views more  IJVR 2006»
15 years 3 months ago
Multi-screen Tiled Displayed, Parallel Rendering System for a Large Terrain Dataset
Real time terrain rendering plays a very important role in many fields, such of GIS, virtual reality, and military simulations. With the rapid development of PC-level hardware, rec...
Ping Yin, Xiaohong Jiang, Jiaoying Shi, Ran Zhou
149
Voted
PC
2006
124views Management» more  PC 2006»
15 years 3 months ago
Message-passing code generation for non-rectangular tiling transformations
Tiling is a well known loop transformation used to reduce communication overhead in distributed memory machines. Although a lot of theoretical research has been done concerning th...
Georgios I. Goumas, Nikolaos Drosinos, Maria Athan...
115
Voted
IJHPCA
2007
88views more  IJHPCA 2007»
15 years 3 months ago
Scaling Properties of Common Statistical Operators for Gridded Datasets
An accurate cost-model that accounts for dataset size and structure can help optimize geoscience data analysis. We develop and apply a computational model to estimate data analysi...
Charles S. Zender, Harry Mangalam
144
Voted
TCAD
2008
114views more  TCAD 2008»
15 years 3 months ago
Word-Level Predicate-Abstraction and Refinement Techniques for Verifying RTL Verilog
el Predicate Abstraction and Refinement Techniques for Verifying RTL Verilog Himanshu Jain, Daniel Kroening, Natasha Sharygina, and Edmund M. Clarke, Fellow, IEEE As a first step, ...
Himanshu Jain, Daniel Kroening, Natasha Sharygina,...