Sciweavers

8080 search results - page 1496 / 1616
» From Computer Networks to Agent Networks
Sort
View
126
Voted
HT
2005
ACM
15 years 9 months ago
Information visualization for an intrusion detection system
— Spatial hypertext was developed from studies of how humans deal with information overflow particularly in situations where data needed to be interpreted quickly. Intrusion det...
James Blustein, Ching-Lung Fu, Daniel L. Silver
135
Voted
SIGMETRICS
2005
ACM
163views Hardware» more  SIGMETRICS 2005»
15 years 9 months ago
Smooth switching problem in buffered crossbar switches
Scalability considerations drive the switch fabric design to evolve from output queueing to input queueing and further to combined input and crosspoint queueing (CICQ). However, f...
Simin He, Shutao Sun, Wei Zhao, Yanfeng Zheng, Wen...
127
Voted
GD
2005
Springer
15 years 9 months ago
Drawing Clustered Graphs in Three Dimensions
Clustered graph is a very useful model for drawing large and complex networks. This paper presents a new method for drawing clustered graphs in three dimensions. The method uses a ...
Joshua Wing Kei Ho, Seok-Hee Hong
141
Voted
GECCO
2005
Springer
155views Optimization» more  GECCO 2005»
15 years 9 months ago
A developmental genetics-inspired approach to robot control
The need to build modular, scalable, and complex technology capable of adaptation, self-assembly, and self-repair has fuelled renewed interest in using approaches inspired by deve...
Sanjeev Kumar
159
Voted
MIDDLEWARE
2005
Springer
15 years 9 months ago
Composite Subscriptions in Content-Based Publish/Subscribe Systems
Distributed publish/subscribe systems are naturally suited for processing events in distributed systems. However, support for expressing patterns about disparate events and algorit...
Guoli Li, Hans-Arno Jacobsen
« Prev « First page 1496 / 1616 Last » Next »