Sciweavers

3343 search results - page 219 / 669
» Network Objects
Sort
View
126
Voted
ICDCS
2005
IEEE
15 years 9 months ago
Keyword Search in DHT-Based Peer-to-Peer Networks
Existing techniques for keyword/attribute search in structured P2P overlays suffer from several problems: unbalanced load, hot spots, fault tolerance, storage redundancy, and unab...
Yuh-Jzer Joung, Chien-Tse Fang, Li-Wei Yang
121
Voted
EOR
2007
123views more  EOR 2007»
15 years 3 months ago
A stochastic model for risk management in global supply chain networks
With the increasing emphasis on supply chain vulnerabilities, effective mathematical tools for analyzing and understanding appropriate supply chain risk management are now attrac...
Mark Goh, Joseph Y. S. Lim, Fanwen Meng
156
Voted
CVIU
2010
150views more  CVIU 2010»
15 years 1 months ago
Wireless smart camera network for real-time human 3D pose reconstruction
A multiple-camera system for 3D pose reconstruction is presented. First, body parts of the user are detected. Each camera has a single-instruction multiple-data (SIMD) processor u...
Zoran Zivkovic
CDC
2010
IEEE
151views Control Systems» more  CDC 2010»
14 years 10 months ago
Input output analysis of power control in wireless networks
In a wireless communication network different users share a common resource. An objective of radio resource management is to assign the resources in an effective way between the us...
Anders Moller, Ulf T. Jönsson
122
Voted
IWOCA
2009
Springer
134views Algorithms» more  IWOCA 2009»
15 years 10 months ago
Combinatorial Models for Cooperation Networks
Abstract. We analyze special random network models – so-called thickened trees – which are constructed by random trees where the nodes are replaced by local clusters. These obj...
Michael Drmota, Bernhard Gittenberger, Reinhard Ku...