Sciweavers

602 search results - page 93 / 121
» Self-Adapting Feature Layers
Sort
View
ACSAC
2004
IEEE
13 years 11 months ago
Vulnerabilities and Security Threats in Structured Overlay Networks: A Quantitative Analysis
1 A number of recent applications have been built on distributed hash tables (DHTs) based overlay networks. Almost all DHT-based schemes employ a tight deterministic data placement...
Mudhakar Srivatsa, Ling Liu
AFRIGRAPH
2001
ACM
13 years 11 months ago
A gesture processing framework for multimodal interaction in virtual reality
This article presents a gesture detection and analysis framework for modelling multimodal interactions. It is particulary designed for its use in Virtual Reality (VR) applications...
Marc Erich Latoschik
FAST
2010
13 years 9 months ago
Provenance for the Cloud
The cloud is poised to become the next computing environment for both data storage and computation due to its pay-as-you-go and provision-as-you-go models. Cloud storage is alread...
Kiran-Kumar Muniswamy-Reddy, Peter Macko, Margo I....
AUTONOMICS
2007
ACM
13 years 9 months ago
Multi-hop broadcast from theory to reality: practical design for ad hoc networks
We propose a complete design for a scope limited, multihop broadcast middleware, which is adapted to the variability of the ad-hoc environment and works in unlimited ad-hoc networ...
Alaeddine El Fawal, Jean-Yves Le Boudec, Kav&eacut...
CONEXT
2008
ACM
13 years 9 months ago
Internet traffic classification demystified: myths, caveats, and the best practices
Recent research on Internet traffic classification algorithms has yielded a flurry of proposed approaches for distinguishing types of traffic, but no systematic comparison of the ...
Hyunchul Kim, Kimberly C. Claffy, Marina Fomenkov,...