Sciweavers

1127 search results - page 220 / 226
» New Algorithms for Generalized Network Flows
Sort
View
CIKM
2008
Springer
14 years 12 months ago
SNIF TOOL: sniffing for patterns in continuous streams
Continuous time-series sequence matching, specifically, matching a numeric live stream against a set of predefined pattern sequences, is critical for domains ranging from fire spr...
Abhishek Mukherji, Elke A. Rundensteiner, David C....
GIS
2010
ACM
14 years 8 months ago
Bridge detection in grid terrains and improved drainage enforcement
Bare Earth gridded digital elevation models (DEMs) are often used to extract hydrologic features such as rivers and watersheds. DEMs must be conditioned by removing spurious sinks...
Ryan Carlson, Andrew Danner
CORR
2011
Springer
174views Education» more  CORR 2011»
14 years 4 months ago
Physical expander in Virtual Tree Overlay
Abstract. In this paper, we propose a new construction of constantdegree expanders motivated by their application in P2P overlay networks and in particular in the design of robust ...
Taisuke Izumi, Maria Potop-Butucaru, Mathieu Valer...
KDD
2009
ACM
203views Data Mining» more  KDD 2009»
15 years 10 months ago
Characterizing individual communication patterns
The increasing availability of electronic communication data, such as that arising from e-mail exchange, presents social and information scientists with new possibilities for char...
R. Dean Malmgren, Jake M. Hofman, Luis A. N. Amara...
ISLPED
2003
ACM
197views Hardware» more  ISLPED 2003»
15 years 3 months ago
Analyzing the energy consumption of security protocols
Security is critical to a wide range of wireless data applications and services. While several security mechanisms and protocols have been developed in the context of the wired In...
Nachiketh R. Potlapally, Srivaths Ravi, Anand Ragh...