首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   11篇
  免费   0篇
工业技术   11篇
  2022年   1篇
  2011年   1篇
  2010年   2篇
  2009年   2篇
  2008年   1篇
  1999年   3篇
  1995年   1篇
排序方式: 共有11条查询结果,搜索用时 218 毫秒
1.
Accurate and timely network traffic measurement is essential for network status monitoring, network fault analysis, network intrusion detection, and network security management. With the rapid development of the network, massive network traffic brings severe challenges to network traffic measurement. However, existing measurement methods suffer from many limitations for effectively recording and accurately analyzing big-volume traffic. Recently, sketches, a family of probabilistic data structures that employ hashing technology for summarizing traffic data, have been widely used to solve these problems. However, current literature still lacks a thorough review on sketch-based traffic measurement methods to offer a comprehensive insight on how to apply sketches for fulfilling various traffic measurement tasks. In this paper, we provide a detailed and comprehensive review on the applications of sketches in network traffic measurement. To this end, we classify the network traffic measurement tasks into four categories based on the target of traffic measurement, namely cardinality estimation, flow size estimation, change anomaly detection, and persistent spreader identification. First, we briefly introduce these four types of traffic measurement tasks and discuss the advantages of applying sketches. Then, we propose a series of requirements with regard to the applications of sketches in network traffic measurement. After that, we perform a fine-grained classification for each sketch-based measurement category according to the technologies applied on sketches. During the review, we evaluate the performance, advantages and disadvantages of current sketch-based traffic measurement methods based on the proposed requirements. Through the thorough review, we gain a number of valuable implications that can guide us to choose and design proper traffic measurement methods based on sketches. We also review a number of general sketches that are highly expected in modern network systems to simultaneously perform multiple traffic measurement tasks and discuss their performance based on the proposed requirements. Finally, through our serious review, we summarize a number of open issues and identify several promising research directions.  相似文献   
2.
Mobile and pervasive computing has seen a rapid development in the last years. Portable, handheld computing devices are getting more popular as their capabilities increase. Therefore, people having the need to work on-the-field have now the possibility to be supported by computer technology, for example, garden or building designers. Ad-hoc networking capabilities of handheld devices enable the development of supporting tools for collaborative work anywhere. This paper presents MCSketcher, a system that enables face-to-face collaborative design based on sketches using handheld devices equipped for spontaneous wireless peer-to-peer networking. It is especially targeted for supporting preliminary, in-the-field work, allowing designers to exchange ideas through sketches on empty sheets or over a recently taken photograph of the object being worked on, in a brainstorming-like working style. Pen-based designed human–computer interaction is the key to supporting collaborative work. The gestures-based command input results in a lightweight yet efficient and easy to use interface. Graph structured hierarchical documents help to overcome the problems of a small screen size.  相似文献   
3.
4.
The revolution in the field of computer graphics during the last two decades has made it possible to create high-quality synthetic images that even experts find difficult to differentiate from real imagery. In this paper, we explore a partially over-looked theme of computer graphics that aims at conveying simple information using simple line drawings and illustrations of polygonal as well as free-form objects.  相似文献   
5.
An Efficient and Flexible Perception Pipeline for Autonomous Agents   总被引:1,自引:0,他引:1  
Agents in virtual environments require a combination of perception and action to behave in an autonomous way. We extend a software architecture for the management of actions blending, called AGENTlib, with a perception mechanism. The perception system provides a uniform interface to various techniques in the field of virtual perception, including synthetic vision, database access and perception persistency. We describe the framework we designed to efficiently filter valuable information from the scene and we address concerns about computation redundancy and data propagation through multiple filtering modules.  相似文献   
6.
Interactive Line Art Rendering of Freeform Surfaces   总被引:3,自引:0,他引:3  
In recent years, synthetically created line art renderings have reached quality levels that are aesthetically pleasing. Moreover, the sketch based approach was found to be quite capable at conveying geometrical information in an intuitive manner. While a growing interest in this type of rendering method has yielded successful and appealing results, the developed techniques were, for the most part, too slow to be embedded in real time interactive display. This paper presents a line art rendering method for freeform polynomial and rational surfaces that is capable of achieving real time and interactive display. A careful preprocessing stage that combines an a-priori construction of line art strokes with proper classification of these strokes, allows one to significantly alleviate the computational cost, in real time, of the sketch based rendering, and enables interactive line art display.  相似文献   
7.
8.
The display of images on binary output hardware requires a halftoning step. Conventional halftoning algorithms approximate image values independently from the image content and often introduce artificial texture that obscures fine details. The objective of this research is to adapt a halftoning technique to 3D scene information and thus to enhance the display of computer generated 3D scenes. Our approach is based on the control of halftoning texture by the combination of ordered dithering and error diffusion techniques. We extend our previous work and enable a user to specify the shape, scale, direction, and contrast of the halftoning texture using an external buffer. We control texture shape by constructing a dither matrix from an arbitrary image or a procedural texture. Texture direction and scale are adapted to the external information by the mapping function. Texture contrast and the accuracy of tone reproduction are varied across the image using the error diffusion process. We halftone images of 3D scenes by using the geometry, position, and illumination information to control the halftoning texture. Thus, the texture provides visual cues and can be used to enhance the viewer's comprehension of the display.  相似文献   
9.
Since the early decades of the 19th century, Turkey has undergone successive programmes of modernisation that have closely identified reform with Westernisation and its implied European ‘success and superiority’ over Turkish culture. Here Edhem Eldem reveals both the external and internal dynamic of Turkish Orientalism, which has proved such a complex multilayered process with an enduring influence on how Turkish society and elites view themselves today. Copyright © 2010 John Wiley & Sons, Ltd.  相似文献   
10.
With the rapid development and the increasing complexity of computer and communication systems and networks, traditional security technologies and measures can not meet the demand for integrated and dynamic security solutions. In this scenario, the use of Intrusion Detection Systems has emerged as a key element in network security.In this paper we address the problem proposing a wavelet-based technique able to detect network anomalies almost in real-time. In more detail, our approach is based on the combined use of sketches and wavelet analysis to reveal the anomalies in data collected at the router level. Moreover, to improve the detection rate we propose a multi time-scale analysis. The performance analysis, presented in this paper, demonstrates the effectiveness of the proposed method.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号