Sciweavers

1055 search results - page 134 / 211
» Performance Analysis of Generalized Multihop Shuffle Network...
Sort
View
CONEXT
2007
ACM
15 years 5 months ago
On the cost of caching locator/ID mappings
Very recent activities in the IETF and in the Routing Research Group (RRG) of the IRTG focus on defining a new Internet architecture, in order to solve scalability issues related ...
Luigi Iannone, Olivier Bonaventure
SIGMETRICS
2011
ACM
140views Hardware» more  SIGMETRICS 2011»
14 years 4 months ago
On the stability and optimality of universal swarms
Recent work on BitTorrent swarms has demonstrated that a bandwidth bottleneck at the seed can lead to the underutilization of the aggregate swarm capacity. Bandwidth underutilizat...
Xia Zhou, Stratis Ioannidis, Laurent Massouli&eacu...
121
Voted
IBPRIA
2003
Springer
15 years 7 months ago
Segmentation of Curvilinear Objects Using a~Watershed-Based Curve Adjacency Graph
Abstract. This paper presents a general framework to segment curvilinear objects in 2D images. A pre-processing step relies on mathematical morphology to obtain a connected line wh...
Thierry Géraud
ENVSOFT
2008
106views more  ENVSOFT 2008»
15 years 1 months ago
Analysis of self-describing gridded geoscience data with netCDF Operators (NCO)
1 The netCDF Operator (NCO) software facilitates manipulation and analysis of gridded2 geoscience data stored in the self-describing netCDF format. NCO is optimized to efficiently3...
Charles S. Zender
IJNSEC
2007
125views more  IJNSEC 2007»
15 years 1 months ago
An Observation-Centric Analysis on the Modeling of Anomaly-based Intrusion Detection
It is generally agreed that two key points always attract special concerns during the modelling of anomaly-based intrusion detection. One is the techniques about discerning two cl...
Zonghua Zhang, Hong Shen, Yingpeng Sang