Sciweavers

6960 search results - page 1024 / 1392
» Continuity Analysis of Programs
Sort
View
TMC
2008
210views more  TMC 2008»
15 years 4 months ago
Adaptive Cluster-Based Data Collection in Sensor Networks with Direct Sink Access
Recently wireless sensor networks featuring direct sink access have been studied as an efficient architecture to gather and process data for numerous applications. In this paper, w...
Mahdi Lotfinezhad, Ben Liang, Elvino S. Sousa
INFOCOM
2010
IEEE
15 years 3 months ago
BitTorrent Darknets
Abstract—A private BitTorrent site (also known as a “BitTorrent darknet”) is a collection of torrents that can only be accessed by members of the darknet community. The priva...
Chao Zhang, Prithula Dhungel, Di Wu, Zhengye Liu, ...
PVLDB
2010
111views more  PVLDB 2010»
14 years 11 months ago
Net-Fli: On-the-fly Compression, Archiving and Indexing of Streaming Network Traffic
The ever-increasing number of intrusions in public and commercial networks has created the need for high-speed archival solutions that continuously store streaming network data to...
Francesco Fusco, Marc Ph. Stoecklin, Michail Vlach...
ICASSP
2011
IEEE
14 years 8 months ago
Unsupervised determination of efficient Korean LVCSR units using a Bayesian Dirichlet process model
Korean is an agglutinative language that does not have explicit word boundaries. It is also a highly inflective language that exhibits severe coarticulation effects. These charac...
Sakriani Sakti, Andrew M. Finch, Ryosuke Isotani, ...
JCDL
2011
ACM
301views Education» more  JCDL 2011»
14 years 7 months ago
Archiving the web using page changes patterns: a case study
A pattern is a model or a template used to summarize and describe the behavior (or the trend) of a data having generally some recurrent events. Patterns have received a considerab...
Myriam Ben Saad, Stéphane Gançarski
« Prev « First page 1024 / 1392 Last » Next »