Sciweavers

22193 search results - page 4117 / 4439
» Multiple Restricted Multiplication
Sort
View
ECUMN
2004
Springer
15 years 8 months ago
Multi-time-Scale Traffic Modeling Using Markovian and L-Systems Models
Traffic engineering of IP networks requires the characterization and modeling of network traffic on multiple time scales due to the existence of several statistical properties that...
Paulo Salvador, António Nogueira, Rui Valad...
CIKM
2006
Springer
15 years 8 months ago
Eigen-trend: trend analysis in the blogosphere based on singular value decompositions
The blogosphere--the totality of blog-related Web sites-has become a great source of trend analysis in areas such as product survey, customer relationship, and marketing. Existing...
Yun Chi, Belle L. Tseng, Jun'ichi Tatemura
CIKM
2006
Springer
15 years 8 months ago
Heuristic containment check of partial tree-pattern queries in the presence of index graphs
The wide adoption of XML has increased the interest of the database community on tree-structured data management techniques. Querying capabilities are provided through tree-patter...
Dimitri Theodoratos, Stefanos Souldatos, Theodore ...
ESAS
2004
Springer
15 years 8 months ago
Advanced Detection of Selfish or Malicious Nodes in Ad Hoc Networks
Abstract. The fact that security is a critical problem when implementing mobile ad hoc networks (MANETs) is widely acknowledged. One of the different kinds of misbehavior a node ma...
Frank Kargl, Andreas Klenk, Stefan Schlott, Michae...
CLEAR
2006
Springer
145views Biometrics» more  CLEAR 2006»
15 years 8 months ago
A Joint System for Single-Person 2D-Face and 3D-Head Tracking in CHIL Seminars
We present the IBM systems submitted and evaluated within the CLEAR'06 evaluation campaign for the tasks of single person visual 3D tracking (localization) and 2D face trackin...
Gerasimos Potamianos, ZhenQiu Zhang
« Prev « First page 4117 / 4439 Last » Next »