Sciweavers

CONSTRAINTS
2011
13 years 3 months ago
CP and IP approaches to cancer radiotherapy delivery optimization
Abstract. We consider the problem of decomposing an integer matrix into a positively weighted sum of binary matrices that have the consecutive-ones property. This problem is well-k...
Davaatseren Baatar, Natashia Boland, Sebastian Bra...
CONIELECOMP
2011
IEEE
13 years 3 months ago
FPGA design and implementation for vertex extraction of polygonal shapes
This work focuses on developing systems of blocks in SIMULINK and VHDL to reuse on design of applications involving the recognition of polygonal objects. Usage of this work reduce...
Jorge Martínez-Carballido, Jorge Guevara-Es...
CNSR
2011
IEEE
257views Communications» more  CNSR 2011»
13 years 3 months ago
On Threshold Selection for Principal Component Based Network Anomaly Detection
—Principal component based anomaly detection has emerged as an important statistical tool for network anomaly detection. It works by projecting summary network information onto a...
Petar Djukic, Biswajit Nandy
CNSR
2011
IEEE
320views Communications» more  CNSR 2011»
13 years 3 months ago
A Structural Analysis of Network Delay
—Network delay is a crucial metric for evaluating the state of the network. We present in this paper a structural analysis of network delay, based on delay measurements of a back...
Atef Abdelkefi, Yuming Jiang
CNSR
2011
IEEE
238views Communications» more  CNSR 2011»
13 years 3 months ago
Measurement Study on PPLive Based on Channel Popularity
Abstract—In recent years, Peer-to-Peer (P2P) streaming systems experienced tremendous growth and became one of the largest bandwidth consumer on Internet. PPLive, one of the most...
Ruixuan Li, Guoqiang Gao, Weijun Xiao, Zhiyong Xu
AICT
2010
IEEE
240views Communications» more  AICT 2010»
13 years 3 months ago
Providing Security in 4G Systems: Unveiling the Challenges
— Several research groups are working on designing new security architectures for 4G networks such as Hokey and Y-Comm. Since designing an efficient security module requires a cl...
Mahdi Aiash, Glenford E. Mapp, Aboubaker Lasebae, ...
AICT
2010
IEEE
216views Communications» more  AICT 2010»
13 years 3 months ago
A Simplified Method for Optimising Sequentially Processed Access Control Lists
Among the various options for implementing Internet packet filters in the form of Access Control Lists (ACLs), is the intuitive – but potentially crude – method of processing t...
Vic Grout, John Davies
IS
2011
13 years 3 months ago
Detecting proximity events in sensor networks
Sensor networks are often used to perform monitoring tasks, such as animal and vehicle tracking, or the surveillance of enemy forces in military applications. In this paper we int...
Antonios Deligiannakis, Yannis Kotidis
IS
2011
13 years 3 months ago
Collection trees for event-monitoring queries
In this paper we present algorithms for building and maintaining efficient collection trees that provide the conduit to disseminate data required for processing monitoring queries...
Antonios Deligiannakis, Yannis Kotidis, Vassilis S...
INFOCOM
2011
IEEE
13 years 3 months ago
Continuous multi-dimensional top-k query processing in sensor networks
—Top-k query has long been an important topic in many fields of computer science. Efficient implementation of the top-k queries is the key for information searching. With the n...
Hongbo Jiang, Jie Cheng, Dan Wang, Chonggang Wang,...