Sciweavers

4298 search results - page 785 / 860
» Computing at the top of the world
Sort
View
CCS
2009
ACM
15 years 8 months ago
As-awareness in Tor path selection
Tor is an anonymous communications network with thousands of router nodes worldwide. An intuition reflected in much of the literature on anonymous communications is that, as an a...
Matthew Edman, Paul F. Syverson
KDD
2009
ACM
167views Data Mining» more  KDD 2009»
15 years 8 months ago
Anomalous window discovery through scan statistics for linear intersecting paths (SSLIP)
Anomalous windows are the contiguous groupings of data points. In this paper, we propose an approach for discovering anomalous windows using Scan Statistics for Linear Intersectin...
Lei Shi, Vandana Pursnani Janeja
ICPP
2009
IEEE
15 years 8 months ago
Run to Potential: Sweep Coverage in Wireless Sensor Networks
—Wireless sensor networks have become a promising technology in monitoring physical world. In many applications with wireless sensor networks, it is essential to understand how w...
Min Xi, Kui Wu, Yong Qi, Jizhong Zhao, Yunhao Liu,...
ATAL
2009
Springer
15 years 8 months ago
Decentralised coordination of continuously valued control parameters using the max-sum algorithm
In this paper we address the problem of decentralised coordination for agents that must make coordinated decisions over continuously valued control parameters (as is required in m...
Ruben Stranders, Alessandro Farinelli, Alex Rogers...
SG
2009
Springer
15 years 8 months ago
Towards the Big Picture: Enriching 3D Models with Information Visualisation and Vice Versa
Abstract. Most information visualisation methods are based on abstract visual representations without any concrete manifestation in the “real world”. However, a variety of abst...
Michael Sedlmair, Kerstin Ruhland, Fabian Hennecke...