Sciweavers

749 search results - page 146 / 150
» Scenario based Analysis of Linear Computations
Sort
View
PODC
2005
ACM
14 years 4 months ago
On the locality of bounded growth
Many large-scale networks such as ad hoc and sensor networks, peer-to-peer networks, or the Internet have the property that the number of independent nodes does not grow arbitrari...
Fabian Kuhn, Thomas Moscibroda, Roger Wattenhofer
RT
2004
Springer
14 years 4 months ago
All-Frequency Precomputed Radiance Transfer for Glossy Objects
We introduce a method based on precomputed radiance transfer (PRT) that allows interactive rendering of glossy surfaces and includes shadowing effects from dynamic, “all-frequen...
Xinguo Liu, Peter-Pike J. Sloan, Heung-Yeung Shum,...
CCS
2010
ACM
13 years 11 months ago
Dialog-based payload aggregation for intrusion detection
Network-based Intrusion Detection Systems (IDSs) such as Snort or Bro that have to analyze the packet payload for all the received data show severe performance problems if used in...
Tobias Limmer, Falko Dressler
BMCBI
2008
220views more  BMCBI 2008»
13 years 11 months ago
Gene prediction in metagenomic fragments: A large scale machine learning approach
Background: Metagenomics is an approach to the characterization of microbial genomes via the direct isolation of genomic sequences from the environment without prior cultivation. ...
Katharina J. Hoff, Maike Tech, Thomas Lingner, Rol...
ALGORITHMICA
2006
139views more  ALGORITHMICA 2006»
13 years 11 months ago
CONQUEST: A Coarse-Grained Algorithm for Constructing Summaries of Distributed Discrete Datasets
Abstract. In this paper we present a coarse-grained parallel algorithm, CONQUEST, for constructing boundederror summaries of high-dimensional binary attributed data in a distribute...
Jie Chi, Mehmet Koyutürk, Ananth Grama