Sciweavers

5153 search results - page 774 / 1031
» Introduction to Randomized Algorithms
Sort
View
CISIM
2008
IEEE
15 years 10 months ago
Evolution Induced Secondary Immunity: An Artificial Immune System Based Intrusion Detection System
The analogy between Immune Systems and Intrusion Detection Systems encourage the use of Artificial Immune Systems for anomaly detection in computer networks. This paper describes ...
Divyata Dal, Siby Abraham, Ajith Abraham, Sugata S...
CISS
2008
IEEE
15 years 10 months ago
Dynamic data compression for wireless transmission over a fading channel
—We consider a wireless node that randomly receives data from different sensor units. The arriving data must be compressed, stored, and transmitted over a wireless link, where bo...
Michael J. Neely
CVPR
2008
IEEE
15 years 10 months ago
Visual quasi-periodicity
Periodicity is at the core of the recognition of many actions. This paper takes the following steps to detect and measure periodicity. 1) We establish a conceptual framework of cl...
Erik Pogalin, Arnold W. M. Smeulders, Andrew H. C....
ICMCS
2008
IEEE
150views Multimedia» more  ICMCS 2008»
15 years 10 months ago
DONet-VoD: A hybrid overlay solution for efficient peer-to-peer video on demand services
The existing DONet-based approach uses successfully a random gossip algorithm for scalable live video streaming. This pure mesh overlay network-based solution may lead to unaccept...
Changqiao Xu, Gabriel-Miro Muntean, Enda Fallon, X...
ISVLSI
2008
IEEE
104views VLSI» more  ISVLSI 2008»
15 years 10 months ago
Thermal-Aware Placement of Standard Cells and Gate Arrays: Studies and Observations
In high-performance VLSI circuits, the on-chip power densities are playing dominant role due to increased scaling of technology, increasing number of components, frequency and ban...
Prasun Ghosal, Tuhina Samanta, Hafizur Rahaman, Pa...