Sciweavers

80 search results - page 14 / 16
» Multi-robot manipulation with no communication using only lo...
Sort
View
SIGMETRICS
2006
ACM
114views Hardware» more  SIGMETRICS 2006»
14 years 8 days ago
On suitability of Euclidean embedding of internet hosts
In this paper, we investigate the suitability of embedding Internet hosts into a Euclidean space given their pairwise distances (as measured by round-trip time). Using the classic...
Sanghwan Lee, Zhi-Li Zhang, Sambit Sahu, Debanjan ...
PR
2008
100views more  PR 2008»
13 years 6 months ago
Boundary based shape orientation
The computation of a shape's orientation is a common task in the area of computer vision and image processing, being used for example to define a local frame of reference and...
Jovisa D. Zunic, Milos Stojmenovic
IUI
2005
ACM
13 years 12 months ago
The centrality of pivotal points in the evolution of scientific networks
In this paper, we describe the development of CiteSpace as an integrated environment for identifying and tracking thematic trends in scientific literature. The goal is to simplify...
Chaomei Chen
INFOCOM
2006
IEEE
14 years 10 days ago
How to Select a Good Alternate Path in Large Peer-to-Peer Systems?
Abstract— When multiple paths are available between communicating hosts, application quality can be improved by switching among them to always use the best one. The key to such a...
Teng Fei, Shu Tao, Lixin Gao, Roch Guérin
IMC
2009
ACM
14 years 25 days ago
ANTIDOTE: understanding and defending against poisoning of anomaly detectors
Statistical machine learning techniques have recently garnered increased popularity as a means to improve network design and security. For intrusion detection, such methods build ...
Benjamin I. P. Rubinstein, Blaine Nelson, Ling Hua...