Sciweavers

10568 search results - page 1809 / 2114
» Computer Intelligence and Formalization
Sort
View
MINENET
2006
ACM
15 years 10 months ago
SVM learning of IP address structure for latency prediction
We examine the ability to exploit the hierarchical structure of Internet addresses in order to endow network agents with predictive capabilities. Specifically, we consider Suppor...
Robert Beverly, Karen R. Sollins, Arthur Berger
142
Voted
AINA
2005
IEEE
15 years 10 months ago
A CAC Scheme for Multimedia Applications Based on Fuzzy Logic
The purpose of admission control is to support the Quality of Service (QoS) demands of real time applications via resource reservation. In order to deal with admission control for...
Leonard Barolli, Mimoza Durresi, Kaoru Sugita, Arj...
CRV
2005
IEEE
181views Robotics» more  CRV 2005»
15 years 10 months ago
Video with Ground-Truth for Validation of Visual Registration, Tracking and Navigation Algorithms
A fundamental task in computer vision is that of determining the position and orientation of a moving camera relative to an observed object or scene. Many such visual tracking alg...
Rustam Stolkin, Alistair Greig, John Gilby
DSN
2005
IEEE
15 years 10 months ago
TIBFIT: Trust Index Based Fault Tolerance for Arbitrary Data Faults in Sensor Networks
Since sensor data gathering is the primary functionality of sensor networks, it is important to provide a fault tolerant method for reasoning about sensed events in the face of ar...
Mark D. Krasniewski, Padma Varadharajan, Bryan Rab...
ICDCS
2005
IEEE
15 years 10 months ago
Non-Cooperation in Competitive P2P Networks
Large-scale competitive P2P networks are threatened by the noncooperation problem,1 where peers do not forward queries to potential competitors. Non-cooperation will be a growing ...
Beverly Yang, Tyson Condie, Sepandar D. Kamvar, He...
« Prev « First page 1809 / 2114 Last » Next »