Sciweavers

34181 search results - page 6463 / 6837
» The Computer System GRAPHOGRAPH
Sort
View
AINA
2008
IEEE
15 years 7 months ago
UTAPS: An Underlying Topology-Aware Peer Selection Algorithm in BitTorrent
BitTorrent is one of the most well known peer-topeer file sharing applications, accounting for a significant proportion of Internet traffic. Current BitTorrent system builds its o...
Wei Li, Shanzhi Chen, Tao Yu
AINA
2008
IEEE
15 years 7 months ago
Disaster Communication Network by Combination of Different Wireless LANs
So far we have developed a disaster information network which is very effective and robust using wireless network. In this paper, we introduce a mobile network for disaster commun...
Kazuo Takahata, Shinya Takada, Yoshitaka Shibata
AMDO
2008
Springer
15 years 7 months ago
View-Invariant Human Action Detection Using Component-Wise HMM of Body Parts
This paper presents a framework for view-invariant action recognition in image sequences. Feature-based human detection becomes extremely challenging when the agent is being observ...
Bhaskar Chakraborty, Marco Pedersoli, Jordi Gonz&a...
133
Voted
ANCS
2008
ACM
15 years 7 months ago
Performing time-sensitive network experiments
Time-sensitive network experiments are difficult. There are major challenges involved in generating high volumes of sufficiently realistic traffic. Additionally, accurately measur...
Neda Beheshti, Yashar Ganjali, Monia Ghobadi, Nick...
APNOMS
2008
Springer
15 years 7 months ago
Application of Data Mining to Network Intrusion Detection: Classifier Selection Model
As network attacks have increased in number and severity over the past few years, intrusion detection system (IDS) is increasingly becoming a critical component to secure the netwo...
Huy Anh Nguyen, Deokjai Choi
« Prev « First page 6463 / 6837 Last » Next »