Sciweavers

20813 search results - page 325 / 4163
» Introduction to Computer Networking
Sort
View
139
Voted
SDM
2009
SIAM
180views Data Mining» more  SDM 2009»
16 years 21 days ago
Structure and Dynamics of Research Collaboration in Computer Science.
Complex systems exhibit emergent patterns of behavior at different levels of organization. Powerful network analysis methods, developed in physics and social sciences, have been s...
Andre Nash, Christian Bird, Earl T. Barr, Premkuma...
124
Voted
COMGEO
2010
ACM
15 years 3 months ago
The complexity of flow on fat terrains and its i/o-efficient computation
We study the complexity and the I/O-efficient computation of flow on triangulated terrains. We present an acyclic graph, the descent graph, that enables us to trace flow paths in ...
Mark de Berg, Otfried Cheong, Herman J. Haverkort,...
CONEXT
2005
ACM
15 years 5 months ago
Triggering wireless network flashes
— Recent advances in wireless technology make high data rate communication in short ranges feasible. The network instances of short-range paths that may achieve high data rates a...
Athanasios Vaios, Ioannis Stavrakakis
PDP
2003
IEEE
15 years 8 months ago
QoS-aware Accounting in Mobile Computing Scenarios
The enlarging market of portable devices and wireless networks stimulates the provisioning of mobilityenabled Internet services with differentiated levels of Quality of Service (Q...
Paolo Bellavista, Antonio Corradi, Silvia Vecchi
136
Voted
IJNSEC
2008
131views more  IJNSEC 2008»
15 years 3 months ago
Performance Analysis of Soft Computing Based Anomaly Detectors
Anomaly detectors have become a necessary component of the computer and information security framework. Some of the numerous drawbacks experienced by the current Anomaly detectors...
N. Srinivasan, V. Vaidehi