Sciweavers

3025 search results - page 200 / 605
» A User-Centered Location Model
Sort
View
ICYCS
2008
IEEE
15 years 10 months ago
Propagation Model of Active Worms in P2P Networks
P2P worms pose heavy threatens to P2P networks. P2P worms exploit common vulnerabilities in member hosts of a P2P network and spread topologically in the P2P network, a potentiall...
Chao-sheng Feng, Zhiguang Qin, Laurence Cuthbet, L...
INFOCOM
2008
IEEE
15 years 10 months ago
Measurement and Modeling of the Origins of Starvation in Congestion Controlled Mesh Networks
—Significant progress has been made in understanding the behavior of TCP and congestion-controlled traffic over multihop wireless networks. Despite these advances, however, no ...
Jingpu Shi, Omer Gurewitz, Vincenzo Mancuso, Josep...
QSIC
2008
IEEE
15 years 10 months ago
Fault Localization with Non-parametric Program Behavior Model
Fault localization is a major activity in software debugging. Many existing statistical fault localization techniques compare feature spectra of successful and failed runs. Some a...
Peifeng Hu, Zhenyu Zhang, Wing Kwong Chan, T. H. T...
ICDE
2007
IEEE
145views Database» more  ICDE 2007»
15 years 10 months ago
A Data Model for Moving Objects Supporting Aggregation
Moving objects databases (MOD) have been receiving increasing attention from the database community in recent years, mainly due to the wide variety of applications that technology...
Bart Kuijpers, Alejandro A. Vaisman
INFOCOM
2006
IEEE
15 years 10 months ago
Extracting a Mobility Model from Real User Traces
Abstract— Understanding user mobility is critical for simulations of mobile devices in a wireless network, but current mobility models often do not reflect real user movements. ...
Minkyong Kim, David Kotz, Songkuk Kim