Sciweavers

11121 search results - page 2073 / 2225
» Computing with Continuous Change
Sort
View
130
Voted
INFOCOM
2009
IEEE
15 years 10 months ago
Null Keys: Limiting Malicious Attacks Via Null Space Properties of Network Coding
—The performance of randomized network coding can suffer significantly when malicious nodes corrupt the content of the exchanged blocks. Previous work have introduced error corr...
Elias Kehdi, Baochun Li
COCO
2009
Springer
105views Algorithms» more  COCO 2009»
15 years 10 months ago
Planar Graph Isomorphism is in Log-Space
Graph Isomorphism is the prime example of a computational problem with a wide difference between the best known lower and upper bounds on its complexity. There is a significant ...
Samir Datta, Nutan Limaye, Prajakta Nimbhorkar, Th...
117
Voted
DIS
2009
Springer
15 years 10 months ago
CHRONICLE: A Two-Stage Density-Based Clustering Algorithm for Dynamic Networks
Abstract. Information networks, such as social networks and that extracted from bibliographic data, are changing dynamically over time. It is crucial to discover time-evolving comm...
Min-Soo Kim 0002, Jiawei Han
SCALESPACE
2009
Springer
15 years 10 months ago
A Multi-scale Feature Based Optic Flow Method for 3D Cardiac Motion Estimation
Abstract. The dynamic behavior of the cardiac muscle is strongly dependent on heart diseases. Optic flow techniques are essential tools to assess and quantify the contraction of t...
Alessandro Becciu, Hans C. van Assen, Luc Florack,...
139
Voted
IMC
2009
ACM
15 years 10 months ago
Live streaming performance of the Zattoo network
A number of commercial peer-to-peer systems for live streaming, such as PPLive, Joost, LiveStation, SOPCast, TVants, etc. have been introduced in recent years. The behavior of the...
Hyunseok Chang, Sugih Jamin, Wenjie Wang
« Prev « First page 2073 / 2225 Last » Next »