Sciweavers

418 search results - page 55 / 84
» A timing-accurate modeling and simulation environment for ne...
Sort
View
JAIR
2002
120views more  JAIR 2002»
13 years 8 months ago
Learning Geometrically-Constrained Hidden Markov Models for Robot Navigation: Bridging the Topological-Geometrical Gap
Hidden Markov models hmms and partially observable Markov decision processes pomdps provide useful tools for modeling dynamical systems. They are particularly useful for represent...
Hagit Shatkay, Leslie Pack Kaelbling
WCNC
2010
IEEE
14 years 27 days ago
MAC Performance Analysis for Vehicle-to-Infrastructure Communication
—The newly emerged vehicular ad hoc network adopts the contention based IEEE 802.11 DCF as its MAC. While it has been extensively studied in the stationary indoor environment (e....
Tom H. Luan, Xinhua Ling, Xuemin Shen
WINET
2008
200views more  WINET 2008»
13 years 9 months ago
Performance evaluation of an IEEE 802.15.4 sensor network with a star topology
One class of applications envisaged for the IEEE 802.15.4 LR-WPAN (low data rate - wireless personal area network) standard is wireless sensor networks for monitoring and control a...
Chandramani Kishore Singh, Anurag Kumar, P. M. Ame...
CSE
2009
IEEE
14 years 3 months ago
A Network-Aware Distributed Membership Protocol for Collaborative Defense
— To counteract current trends in network malware, distributed solutions have been developed that harness the power of collaborative end-host sensors. While these systems greatly...
David Zage, Carl Livadas, Eve M. Schooler
CRITIS
2007
13 years 10 months ago
A Malware Detector Placement Game for Intrusion Detection
We propose and investigate a game-theoretic approach to the malware filtering and detector placement problem which arises in network security. Our main objective is to develop opt...
Stephan Schmidt, Tansu Alpcan, Sahin Albayrak, Tam...