Sciweavers

653 search results - page 130 / 131
» Dynamic node activation in networks of rechargeable sensors
Sort
View
SERSCISA
2009
Springer
13 years 12 months ago
ATTENTION: ATTackEr Traceback Using MAC Layer AbNormality DetecTION
Denial-of-Service (DoS) and Distributed DoS (DDoS) attacks can cause serious problems in wireless networks due to limited network and host resources. Attacker traceback is a promi...
Yongjin Kim
GCB
2004
Springer
101views Biometrics» more  GCB 2004»
13 years 10 months ago
Kleene's Theorem and the Solution of Metabolic Carbon Labeling Systems
: Carbon Labeling Systems (CLS) are large equation systems that describe the dynamics of labeled carbon atoms in a metabolic network. The rapid solution of these systems is the alg...
Nicole Isermann, Michael Weitzel, Wolfgang Wiecher...
KDD
2007
ACM
159views Data Mining» more  KDD 2007»
14 years 5 months ago
Constraint-driven clustering
Clustering methods can be either data-driven or need-driven. Data-driven methods intend to discover the true structure of the underlying data while need-driven methods aims at org...
Rong Ge, Martin Ester, Wen Jin, Ian Davidson
TASE
2008
IEEE
13 years 5 months ago
Group Elevator Scheduling With Advance Information for Normal and Emergency Modes
Group elevator scheduling has long been recognized as an important problem for building transportation efficiency, since unsatisfactory elevator service is one of the major complai...
Peter B. Luh, Bo Xiong, Shi-Chung Chang
UIST
1993
ACM
13 years 9 months ago
VB2: An Architecture for Interaction in Synthetic Worlds
This paper describes the VB2 architecture for the construction of three-dimensional interactive applications. The system's state and behavior are uniformly represented as a n...
Enrico Gobbetti, Jean-Francis Balaguer, Daniel Tha...