Sciweavers

533 search results - page 95 / 107
» Research and Application of Distributed Fusion System Based ...
Sort
View
130
Voted
IPSN
2004
Springer
15 years 9 months ago
Lattice sensor networks: capacity limits, optimal routing and robustness to failures
We study network capacity limits and optimal routing algorithms for regular sensor networks, namely, square and torus grid sensor networks, in both, the static case (no node failu...
Guillermo Barrenechea, Baltasar Beferull-Lozano, M...
125
Voted
VLDB
2007
ACM
154views Database» more  VLDB 2007»
15 years 9 months ago
P2P Authority Analysis for Social Communities
PageRank-style authority analyses of Web graphs are of great importance for Web mining. Such authority analyses also apply to hot “Web 2.0” applications that exhibit a natural...
Josiane Xavier Parreira, Sebastian Michel, Matthia...
104
Voted
CSE
2009
IEEE
15 years 10 months ago
Analysing BitTorrent's Seeding Strategies
Abstract— BitTorrent is a typical peer-to-peer (P2P) file distribution application that has gained tremendous popularity in recent years. A considerable amount of research exists...
Xinuo Chen, Stephen A. Jarvis
160
Voted
VIS
2005
IEEE
297views Visualization» more  VIS 2005»
16 years 4 months ago
OpenGL Multipipe SDK: A Toolkit for Scalable Parallel Rendering
We describe OpenGL Multipipe SDK (MPK), a toolkit for scalable parallel rendering based on OpenGL. MPK provides a uniform application programming interface (API) to manage scalabl...
Praveen Bhaniramka, Philippe C. D. Robert, Stefan ...
152
Voted
ISI
2008
Springer
15 years 3 months ago
Real time intrusion prediction, detection and prevention programs
An Intrusion Detection Program (IDP) analyzes what happens or has happened during an execution and tries to find indications that the computer has been misused. In this talk, we p...
A. Abraham