Sciweavers

3467 search results - page 509 / 694
» A New Localized Network Based Routing Model in Computer and ...
Sort
View
IMC
2004
ACM
14 years 1 months ago
A framework for malicious workload generation
Malicious traffic from self-propagating worms and denialof-service attacks constantly threatens the everyday operation of Internet systems. Defending networks from these threats d...
Joel Sommers, Vinod Yegneswaran, Paul Barford
EAGC
2003
Springer
14 years 1 months ago
Decentralized vs. Centralized Economic Coordination of Resource Allocation in Grids
Application layer networks are software architectures that allow the provisioning of services requiring a huge amount of resources by connecting large numbers of individual compute...
Torsten Eymann, Michael Reinicke, Oscar Ardaiz, Pa...
ISCC
2005
IEEE
109views Communications» more  ISCC 2005»
14 years 1 months ago
From Mobility Management to Connectivity Management
This position paper presents the trend of the research focus transition from mobility management to connectivity management, for the emerging pervasive and ubiquitous computing pa...
Jun-Zhao Sun, Jaakko J. Sauvola
ICIP
2006
IEEE
14 years 9 months ago
Multi-View Image Registration for Wide-Baseline Visual Sensor Networks
We present a new dense multi-view registration technique for wide-baseline video/images that integrates a parametric optical flowbased approach with a sparse set of feature corres...
Gulcin Caner, A. Murat Tekalp, Gaurav Sharma, Wend...
MOBIQUITOUS
2007
IEEE
14 years 2 months ago
TRULLO - local trust bootstrapping for ubiquitous devices
—Handheld devices have become sufficiently powerful that it is easy to create, disseminate, and access digital content (e.g., photos, videos) using them. The volume of such cont...
Daniele Quercia, Stephen Hailes, Licia Capra