Sciweavers

4752 search results - page 826 / 951
» From computation models to models of provenance: the RWS app...
Sort
View
WMASH
2003
ACM
15 years 6 months ago
End-to-end throughput and delay assurances in multihop wireless hotspots
Next generation Wireless Local Area Networks (WLAN’s) are likely to require multihop wireless connections between mobile nodes and Internet gateways to achieve high data rates f...
Kuang-Ching Wang, Parameswaran Ramanathan
126
Voted
CIKM
2003
Springer
15 years 6 months ago
Queueing analysis of relational operators for continuous data streams
Currently, stream data processing is an active area of research, which includes everything from algorithms and architectures for stream processing to modelling and analysis of var...
Qingchun Jiang, Sharma Chakravarthy
AFRIGRAPH
2009
ACM
15 years 5 months ago
Analytic simplification of animated characters
Traditionally, levels of detail (LOD) for animated characters are computed from a single pose. Later techniques refined this approach by considering a set of sample poses and eval...
Bruce Merry, Patrick Marais, James E. Gain
ACSAC
2004
IEEE
15 years 5 months ago
Correlating Intrusion Events and Building Attack Scenarios Through Attack Graph Distances
We map intrusion events to known exploits in the network attack graph, and correlate the events through the corresponding attack graph distances. From this, we construct attack sc...
Steven Noel, Eric Robertson, Sushil Jajodia
SEC
2007
15 years 3 months ago
Building a Distributed Semantic-aware Security Architecture
Enhancing the service-oriented architecture paradigm with semantic components is a new field of research and goal of many ongoing projects. The results lead to more powerful web a...
Jan Kolter, Rolf Schillinger, Günther Pernul