Sciweavers

2913 search results - page 234 / 583
» How Much to Copy
Sort
View
135
Voted
MOBIHOC
2006
ACM
16 years 12 days ago
Modeling steady-state and transient behaviors of user mobility: : formulation, analysis, and application
Recent studies on mobility modeling have focused on characterizing user mobility from real traces of wireless LANs (WLANs) and creating mobility models based on such characterizat...
Jong-Kwon Lee, Jennifer C. Hou
111
Voted
MOBIHOC
2006
ACM
16 years 12 days ago
Topology control meets SINR: : the scheduling complexity of arbitrary topologies
To date, topology control in wireless ad hoc and sensor networks--the study of how to compute from the given communication network a subgraph with certain beneficial properties--h...
Thomas Moscibroda, Roger Wattenhofer, Aaron Zollin...
102
Voted
MSS
2005
IEEE
84views Hardware» more  MSS 2005»
15 years 6 months ago
Storage-Based Intrusion Detection for Storage Area Networks (SANs)
Storage systems are the next frontier for providing protection against intrusion. Since storage systems see changes to persistent data, several types of intrusions can be detected...
Mohammad Banikazemi, Dan E. Poff, Bülent Abal...
IMAMS
2007
115views Mathematics» more  IMAMS 2007»
15 years 2 months ago
Segmenting Periodic Reliefs on Triangle Meshes
Decorative reliefs are widely used for e.g. packaging and porcelain design. In periodic reliefs, the relief repeats a pattern, for example all the way around an underlying surface...
Shenglan Liu, Ralph R. Martin, Frank C. Langbein, ...
INTERNET
2007
105views more  INTERNET 2007»
15 years 22 days ago
Workflow Planning on a Grid
evel of abstraction, we can represent a workflow as a directed graph with operators (or tasks) at the vertices (see Figure 1). Each operator takes inputs from data sources or from ...
Craig W. Thompson, Wing Ning Li, Zhichun Xiao