Sciweavers

533 search results - page 95 / 107
» Research and Application of Distributed Fusion System Based ...
Sort
View
IPSN
2004
Springer
14 years 22 days ago
Lattice sensor networks: capacity limits, optimal routing and robustness to failures
We study network capacity limits and optimal routing algorithms for regular sensor networks, namely, square and torus grid sensor networks, in both, the static case (no node failu...
Guillermo Barrenechea, Baltasar Beferull-Lozano, M...
VLDB
2007
ACM
154views Database» more  VLDB 2007»
14 years 1 months ago
P2P Authority Analysis for Social Communities
PageRank-style authority analyses of Web graphs are of great importance for Web mining. Such authority analyses also apply to hot “Web 2.0” applications that exhibit a natural...
Josiane Xavier Parreira, Sebastian Michel, Matthia...
CSE
2009
IEEE
14 years 2 months ago
Analysing BitTorrent's Seeding Strategies
Abstract— BitTorrent is a typical peer-to-peer (P2P) file distribution application that has gained tremendous popularity in recent years. A considerable amount of research exists...
Xinuo Chen, Stephen A. Jarvis
VIS
2005
IEEE
297views Visualization» more  VIS 2005»
14 years 8 months ago
OpenGL Multipipe SDK: A Toolkit for Scalable Parallel Rendering
We describe OpenGL Multipipe SDK (MPK), a toolkit for scalable parallel rendering based on OpenGL. MPK provides a uniform application programming interface (API) to manage scalabl...
Praveen Bhaniramka, Philippe C. D. Robert, Stefan ...
ISI
2008
Springer
13 years 7 months ago
Real time intrusion prediction, detection and prevention programs
An Intrusion Detection Program (IDP) analyzes what happens or has happened during an execution and tries to find indications that the computer has been misused. In this talk, we p...
A. Abraham