Sciweavers

1639 search results - page 244 / 328
» Degree-constrained network flows
Sort
View
ICDE
2008
IEEE
188views Database» more  ICDE 2008»
16 years 2 months ago
Efficient Aggregate Computation over Data Streams
Abstract-- Cisco's NetFlow Collector (NFC) is a powerful example of a real-world product that supports multiple aggregate queries over a continuous stream of IP flow records. ...
Kanthi Nagaraj, K. V. M. Naidu, Rajeev Rastogi, Sc...
88
Voted
ICCAD
2002
IEEE
73views Hardware» more  ICCAD 2002»
15 years 9 months ago
Shaping interconnect for uniform current density
As the VLSI technology scaling down, the electromigration problem becomes one of the major concerns in high-performance IC design for both power network and signal interconnects. ...
Muzhou Shao, D. F. Wong, Youxin Gao, Li-Pen Yuan, ...
MUE
2008
IEEE
83views Multimedia» more  MUE 2008»
15 years 7 months ago
Using Adaptive Bandwidth Allocation Approach to Defend DDoS Attacks
Denial of service attacks occur when the attacks are from a single host, whereas distributed denial of service attacks occur when multiple affected systems flood the bandwidth or ...
Chu-Hsing Lin, Jung-Chun Liu, Hsun-Chi Huang, Tsun...
MMM
2007
Springer
105views Multimedia» more  MMM 2007»
15 years 7 months ago
Discovering User Information Goals with Semantic Website Media Modeling
In this work we present an approach to capture the total semantics in multimedia-multimodal web pages. Our research improves upon the state-ofthe-art with two key features: (1) cap...
Bibek Dev Bhattarai, Mike Wong, Rahul Singh
BPM
2007
Springer
118views Business» more  BPM 2007»
15 years 6 months ago
Privacy Preserving Collaborative Business Process Management
The basic objective of collaborative supply chain planning (CSCP) is to fulfill the demand of the customers by integrating a network of organizations through mediums such as intern...
Sumit Chakraborty, Asim Kumar Pal