Sciweavers

182 search results - page 34 / 37
» Compact Balanced Tries
Sort
View
NOMS
2008
IEEE
15 years 4 months ago
Optimizing request denial and latency in an agent-based VPN architecture
—Agent-based virtual private networks architecture (ABVA) refers to the environment where a third-party provider runs and administers remote access VPN service for organizations ...
Haiyang Qian, Steve Dispensa, Deep Medhi
ICC
2007
IEEE
103views Communications» more  ICC 2007»
15 years 4 months ago
Providing Differentiated Quality-of-Protection for Surviving Double-Link Failures in WDM Mesh Networks
—Providing differentiated Quality-of-Protection (QoP) for surviving single-link failures in WDM mesh networks has been extensively studied in recent years. This paper investigate...
Xu Shao, Luying Zhou, Weiguo Zheng, Yixin Wang
ISPA
2004
Springer
15 years 3 months ago
Cayley DHTs - A Group-Theoretic Framework for Analyzing DHTs Based on Cayley Graphs
Static DHT topologies influence important features of such DHTs such as scalability, communication load balancing, routing efficiency and fault tolerance. Nevertheless, it is co...
Changtao Qu, Wolfgang Nejdl, Matthias Kriesell
CGI
2000
IEEE
15 years 2 months ago
To Gesture or Not to Gesture: What is the Question?
Computer synthesized characters are expected to make appropriate face, limb, and body gestures during communicative acts. We focus on non-facial movements and try to elucidate wha...
Norman I. Badler, Monica Costa, Liwei Zhao, Diane ...
SIGMOD
1996
ACM
151views Database» more  SIGMOD 1996»
15 years 2 months ago
BIRCH: An Efficient Data Clustering Method for Very Large Databases
Finding useful patterns in large datasets has attracted considerable interest recently, and one of the most widely st,udied problems in this area is the identification of clusters...
Tian Zhang, Raghu Ramakrishnan, Miron Livny