Sciweavers

7865 search results - page 1338 / 1573
» Large correlation analysis
Sort
View
INFOCOM
2010
IEEE
15 years 3 months ago
Safeguarding Data Delivery by Decoupling Path Propagation and Adoption
—False routing announcements are a serious security problem, which can lead to widespread service disruptions in the Internet. A number of detection systems have been proposed an...
Mingui Zhang, Bin Liu, Beichuan Zhang
INFOCOM
2010
IEEE
15 years 3 months ago
URCA: Pulling out Anomalies by their Root Causes
—Traffic anomaly detection has received a lot of attention over recent years, but understanding the nature of these anomalies and identifying the flows involved is still a manu...
Fernando Silveira, Christophe Diot
INFOCOM
2010
IEEE
15 years 3 months ago
Cooperative Resource Management in Cognitive WiMAX with Femto Cells
Abstract—WiMAX with femto cells is a cost-effective nextgeneration broadband wireless communication system. Cognitive Radio (CR) has recently emerged as a promising technology to...
Jin Jin, Baochun Li
JGAA
2010
128views more  JGAA 2010»
15 years 3 months ago
Intersection Graphs of Pseudosegments: Chordal Graphs
We investigate which chordal graphs have a representation as intersection graphs of pseudosegments. For positive we have a construction which shows that all chordal graphs that ca...
Cornelia Dangelmayr, Stefan Felsner, William T. Tr...
TOG
2008
104views more  TOG 2008»
15 years 3 months ago
A system for high-volume acquisition and matching of fresco fragments: reassembling Theran wall paintings
Although mature technologies exist for acquiring images, geometry, and normals of small objects, they remain cumbersome and time-consuming for non-experts to employ on a large sca...
Benedict J. Brown, Corey Toler-Franklin, Diego Neh...
« Prev « First page 1338 / 1573 Last » Next »