Sciweavers

12050 search results - page 2115 / 2410
» Modeling and Simulation
Sort
View
134
Voted
ICISS
2009
Springer
15 years 10 months ago
Making Peer-Assisted Content Distribution Robust to Collusion Using Bandwidth Puzzles
Many peer-assisted content-distribution systems reward a peer based on the amount of data that this peer serves to others. However, validating that a peer did so is, to our knowled...
Michael K. Reiter, Vyas Sekar, Chad Spensky, Zheng...
143
Voted
ISMIS
2009
Springer
15 years 10 months ago
Discovering Structured Event Logs from Unstructured Audit Trails for Workflow Mining
Workflow mining aims to find graph-based process models based on activities, emails, and various event logs recorded in computer systems. Current workflow mining techniques mainly ...
Liqiang Geng, Scott Buffett, Bruce Hamilton, Xin W...
151
Voted
ISVC
2009
Springer
15 years 10 months ago
Cartoon Animation Style Rendering of Water
We present a cartoon animation style rendering method for water animation. In an effort to capture and represent crucial features of water observed in traditional cartoon animatio...
Mi You, Jinho Park, Byungkuk Choi, Jun-yong Noh
146
Voted
NETCOOP
2009
Springer
15 years 10 months ago
User Association to Optimize Flow Level Performance in Wireless Systems with Dynamic Interference
We study the impact of user association policies on flow-level performance in interference limited wireless networks. Most research in this area has used static interference model...
Balaji Rengarajan, Gustavo de Veciana
150
Voted
NOSSDAV
2009
Springer
15 years 10 months ago
Cross-tree adjustment for spatialized audio streaming over networked virtual environments
In recent years, integrated spatialized voice services have become an appealing application for networked virtual environments (NVE), e.g., Second Life. With a spatialized voice s...
Ke Liang, Roger Zimmermann
« Prev « First page 2115 / 2410 Last » Next »