Sciweavers

292 search results - page 58 / 59
» Power Management Techniques for Control-Flow Intensive Desig...
Sort
View
SASN
2005
ACM
13 years 10 months ago
Key distribution and update for secure inter-group multicast communication
Group communication has become an important component in wireless networks. In this paper, we focus on the environments in which multiple groups coexist in the system, and both in...
Weichao Wang, Bharat K. Bhargava
CIKM
2000
Springer
13 years 9 months ago
The Webspace Method: On the Integration of Database Technology with Multimedia Retrieval
Large collections of documents containing various types of multimedia, are made available to the WWW. Unfortunately, due to the un-structuredness of Internet environments it is ha...
Roelof van Zwol, Peter M. G. Apers
GIS
2002
ACM
13 years 4 months ago
Opening the black box: interactive hierarchical clustering for multivariate spatial patterns
Clustering is one of the most important tasks for geographic knowledge discovery. However, existing clustering methods have two severe drawbacks for this purpose. First, spatial c...
Diansheng Guo, Donna Peuquet, Mark Gahegan
FGCS
2010
84views more  FGCS 2010»
13 years 3 months ago
System-level virtualization research at Oak Ridge National Laboratory
System-level virtualization is today enjoying a rebirth, after first gaining popularity in the 1970s as a technique to effectively share what were then considered large computin...
Stephen L. Scott, Geoffroy Vallée, Thomas N...
IMC
2010
ACM
13 years 2 months ago
What happened in my network: mining network events from router syslogs
Router syslogs are messages that a router logs to describe a wide range of events observed by it. They are considered one of the most valuable data sources for monitoring network ...
Tongqing Qiu, Zihui Ge, Dan Pei, Jia Wang, Jun Xu