Sciweavers

1639 search results - page 327 / 328
» Degree-constrained network flows
Sort
View
FGCS
2008
109views more  FGCS 2008»
13 years 5 months ago
Gridification of collaborative audiovisual organizations through the MediaGrid framework
Abstract In this publication, we discuss a use case for employing Grid technology in a media production / distribution environment. This type of environment is faced with the chall...
Bruno Volckaert, Tim Wauters, Marc De Leenheer, Pi...
CORR
2006
Springer
112views Education» more  CORR 2006»
13 years 5 months ago
Pull-Based Data Broadcast with Dependencies: Be Fair to Users, not to Items
Broadcasting is known to be an efficient means of disseminating data in wireless communication environments (such as Satellite, mobile phone networks,...). It has been recently ob...
Julien Robert, Nicolas Schabanel
SIAMSC
2008
113views more  SIAMSC 2008»
13 years 5 months ago
An Efficient and Robust Method for Simulating Two-Phase Gel Dynamics
We develop a computational method for simulating models of gel dynamics where the gel is described by two phases, a networked polymer and a fluid solvent. The models consist of tra...
Grady B. Wright, Robert D. Guy, Aaron L. Fogelson
TCAD
2008
195views more  TCAD 2008»
13 years 5 months ago
Multilayer Obstacle-Avoiding Rectilinear Steiner Tree Construction Based on Spanning Graphs
Given a set of pins and a set of obstacles on routing layers, a multilayer obstacle-avoiding rectilinear Steiner minimal tree (ML-OARSMT) connects these pins by rectilinear edges w...
Chung-Wei Lin, Shih-Lun Huang, Kai-Chi Hsu, Meng-X...
TPDS
2008
78views more  TPDS 2008»
13 years 5 months ago
Tracing Worm Break-In and Contaminations via Process Coloring: A Provenance-Preserving Approach
To detect and investigate self-propagating worm attacks against networked servers, the following capabilities are desirable: (1) raising timely alerts to trigger a worm investigat...
Xuxian Jiang, Florian P. Buchholz, Aaron Walters, ...