Sciweavers

4143 search results - page 99 / 829
» A theory of distributed aspects
Sort
View
CVPR
2007
IEEE
14 years 9 months ago
Topology Preserving Log-Unbiased Nonlinear Image Registration: Theory and Implementation
In this paper, we present a novel framework for constructing large deformation log-unbiased image registration models that generate theoretically and intuitively correct deformati...
Igor Yanovsky, Paul M. Thompson, Stanley Osher, Al...
ICS
2010
Tsinghua U.
14 years 5 months ago
Game Theory with Costly Computation: Formulation and Application to Protocol Security
: We develop a general game-theoretic framework for reasoning about strategic agents performing possibly costly computation. In this framework, many traditional game-theoretic resu...
Joseph Y. Halpern, Rafael Pass
MDM
2009
Springer
126views Communications» more  MDM 2009»
14 years 2 months ago
Outlier Detection in Ad Hoc Networks Using Dempster-Shafer Theory
Mobile Ad-hoc NETworks (MANETs) are known to be vulnerable to a variety of attacks due to lack of central authority or fixed network infrastructure. Many security schemes have bee...
Wenjia Li, Anupam Joshi
GLOBECOM
2007
IEEE
14 years 2 months ago
Sensing Workload Scheduling in Sensor Networks Using Divisible Load Theory
Abstract— This paper presents scheduling strategies for sensing workload in wireless sensor networks using Divisible Load Theory (DLT), which offers a tractable model and realist...
Xiaolin Li, Xinxin Liu, Hui Kang
IWIA
2006
IEEE
14 years 1 months ago
An Application of Information Theory to Intrusion Detection
Zero-day attacks, new (anomalous) attacks exploiting previously unknown system vulnerabilities, are a serious threat. Defending against them is no easy task, however. Having ident...
E. Earl Eiland, Lorie M. Liebrock