Sciweavers

18451 search results - page 3527 / 3691
» Selecting the
Sort
View
CCR
2008
118views more  CCR 2008»
13 years 9 months ago
A generic language for application-specific flow sampling
Flow records gathered by routers provide valuable coarse-granularity traffic information for several measurement-related network applications. However, due to high volumes of traf...
Harsha V. Madhyastha, Balachander Krishnamurthy
CCR
2008
91views more  CCR 2008»
13 years 9 months ago
Serial experiments online
Current network protocols must comply with rigid interfaces and rules of behavior to fit into well defined, vertical protocol stacks. It is difficult for network designers to offe...
Juan J. Ramos-Muñoz, Lidia Yamamoto, Christ...
COMGEO
2010
ACM
13 years 9 months ago
Approximation algorithm for the kinetic robust K-center problem
Clustering is an important problem and has numerous applications. In this paper we consider an important clustering problem, called the k-center problem. We are given a discrete p...
Sorelle A. Friedler, David M. Mount
CG
2008
Springer
13 years 9 months ago
Masked photo blending: Mapping dense photographic data set on high-resolution sampled 3D models
The technological advance of sensors is producing an exponential size growth of the data coming from 3D scanning and digital photography. The production of digital 3D models consi...
Marco Callieri, Paolo Cignoni, Massimiliano Corsin...
COMPSEC
2010
146views more  COMPSEC 2010»
13 years 9 months ago
An intruder model with message inspection for model checking security protocols
Model checking security protocols is based on an intruder model that represents the eavesdropping or interception of the exchanged messages, while at the same time performs attack...
Stylianos Basagiannis, Panagiotis Katsaros, Andrew...
« Prev « First page 3527 / 3691 Last » Next »