Sciweavers

30 search results - page 6 / 6
» ATV: An Efficient Method for Constructing a Certification Pa...
Sort
View
JNCA
2008
103views more  JNCA 2008»
13 years 5 months ago
Congestion control of bluetooth radio system by piconet restructuring
Bluetooth is a low-cost and short-range wireless communication technology. Two or more bluetooth devices connected form a piconet and two or more piconets connected form a scatter...
Gwo-Jong Yu, Chih-Yung Chang
IJSN
2006
65views more  IJSN 2006»
13 years 5 months ago
The loop fallacy and deterministic serialisation in tracing intrusion connections through stepping stones
: In order to conceal their identity and origin, network based intruders seldom attack directly from their own hosts, but rather stage their attacks through intermediate `stepping ...
Xinyuan Wang
AAAI
2008
13 years 7 months ago
Resource Constrained Distributed Constraint Optimization with Virtual Variables
Cooperative problem solving with resource constraints are important in practical multi-agent systems. Resource constraints are necessary to handle practical problems including dis...
Toshihiro Matsui, Hiroshi Matsuo, Marius Silaghi, ...
WWW
2009
ACM
14 years 6 months ago
Smart Miner: a new framework for mining large scale web usage data
In this paper, we propose a novel framework called SmartMiner for web usage mining problem which uses link information for producing accurate user sessions and frequent navigation...
Murat Ali Bayir, Ismail Hakki Toroslu, Ahmet Cosar...
VISUALIZATION
1996
IEEE
13 years 9 months ago
Real-Time Incremental Visualization of Dynamic Ultrasound Volumes Using Parallel BSP Trees
We present a method for producing real-time volume visualizations of continuously captured, arbitrarily-oriented 2D arrays (slices) of data. Our system constructs a 3D representat...
William F. Garrett, Henry Fuchs, Mary C. Whitton, ...