Sciweavers

3238 search results - page 468 / 648
» Multi-return function call
Sort
View
114
Voted
ICCV
2005
IEEE
15 years 8 months ago
Conformal Metrics and True "Gradient Flows" for Curves
We wish to endow the manifold M of smooth curves in lRn with a Riemannian metric that allows us to treat continuous morphs (homotopies) between two curves c0 and c1 as trajectorie...
Anthony J. Yezzi, Andrea Mennucci
150
Voted
INFOCOM
2005
IEEE
15 years 8 months ago
IPStash: a set-associative memory approach for efficient IP-lookup
—IP-Lookup is a challenging problem because of the increasing routing table sizes, increased traffic, and higher speed links. These characteristics lead to the prevalence of hard...
Stefanos Kaxiras, Georgios Keramidas
128
Voted
INFOCOM
2005
IEEE
15 years 8 months ago
Architecture and algorithms for an IEEE 802.11-based multi-channel wireless mesh network
— Even though multiple non-overlapped channels exist in the 2.4GHz and 5GHz spectrum, most IEEE 802.11-based multi-hop ad hoc networks today use only a single channel. As a resul...
Ashish Raniwala, Tzi-cker Chiueh
INFOCOM
2005
IEEE
15 years 8 months ago
rDCF: a relay-enabled medium access control protocol for wireless ad hoc networks
—It is well known that IEEE 802.11 provides a physical layer multirate capability and, hence, MAC layer mechanisms are needed to exploit this capability. Several solutions have b...
Hao Zhu, Guohong Cao
147
Voted
KBSE
2005
IEEE
15 years 8 months ago
Designing and implementing a family of intrusion detection systems
Intrusion detection systems are distributed applications that analyze the events in a networked system to identify malicious behavior. The analysis is performed using a number of ...
Richard A. Kemmerer