Sciweavers

3110 search results - page 558 / 622
» On the initialization of the DNMF algorithm
Sort
View
IDEAS
2008
IEEE
256views Database» more  IDEAS 2008»
15 years 11 months ago
WIDS: a sensor-based online mining wireless intrusion detection system
This paper proposes WIDS, a wireless intrusion detection system, which applies data mining clustering technique to wireless network data captured through hardware sensors for purp...
Christie I. Ezeife, Maxwell Ejelike, Akshai K. Agg...
125
Voted
IPPS
2008
IEEE
15 years 11 months ago
PROD: Relayed file retrieving in overlay networks
— To share and exchange the files among Internet users, Peerto-Peer (P2P) applications build another layer of overlay networks on top of the Internet Infrastructure. In P2P fil...
Zhiyong Xu, D. Stefanescu, Honggang Zhang, Laxmi N...
IPPS
2008
IEEE
15 years 11 months ago
A modeling approach for estimating execution time of long-running scientific applications
In a Grid computing environment, resources are shared among a large number of applications. Brokers and schedulers find matching resources and schedule the execution of the applic...
Seyed Masoud Sadjadi, Shu Shimizu, Javier Figueroa...
ICC
2007
IEEE
15 years 10 months ago
Design of Single-Group Multicasting-Beamformers
— For the single-group multicast scenario, where K users are served with the same data by a base station equipped with N antennas, we present two beamforming algorithms which out...
Raphael Hunger, David A. Schmidt, Michael Joham, A...
PG
2007
IEEE
15 years 10 months ago
Genus Oblivious Cross Parameterization: Robust Topological Management of Inter-Surface Maps
We consider the problem of generating a map between two triangulated meshes, M and M’, with arbitrary and possibly differing genus. This problem has rarely been tackled in its g...
Janine Bennett, Valerio Pascucci, Kenneth I. Joy