Sciweavers

2863 search results - page 464 / 573
» Constructing minimum-interference networks
Sort
View
DEBU
2008
187views more  DEBU 2008»
15 years 1 months ago
Social SQL: Tools for Exploring Social Databases
Social media are constructed from the collective contributions of potentially millions of individuals and present an increasingly common and large scale form of database. As these...
Marc A. Smith, Vladimir Barash
CN
2007
172views more  CN 2007»
15 years 1 months ago
Threshold cryptography in P2P and MANETs: The case of access control
Ad hoc groups, such as peer-to-peer (P2P) systems and mobile ad hoc networks (MANETs) represent recent technological advancements. They support low-cost, scalable and fault-tolera...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
IJCV
2006
166views more  IJCV 2006»
15 years 1 months ago
Fast Constrained Surface Extraction by Minimal Paths
A new approach performing surface extraction from 3D images under user defined geometrical constraints is presented. The constraints are introduced through boundary curves given by...
Roberto Ardon, Laurent D. Cohen
ISM
2006
IEEE
132views Multimedia» more  ISM 2006»
15 years 1 months ago
BM-ALM: An Application Layer Multicasting with Behavior Monitoring Approach
IP multicasting is the most efficient way to perform group data distribution, as it eliminates traffic redundancy and improves bandwidth utilization. Application Layer Multicast (...
Dewan Tanvir Ahmed, Shervin Shirmohammadi
JNCA
2008
123views more  JNCA 2008»
15 years 1 months ago
Edge-limited scalable QoS flow set-up
Although the Differentiated Services architecture supports scalable packet forwarding based on aggregate flows, the detailed procedure of Quality of Service (QoS) flow set-up with...
James Lembke, Byung Kyu Choi