Sciweavers

4064 search results - page 645 / 813
» Animation: can it facilitate
Sort
View
IJNSEC
2011
232views more  IJNSEC 2011»
13 years 4 months ago
Location-aware, Trust-based Detection and Isolation of Compromised Nodes in Wireless Sensor Networks
The detection and isolation of compromised nodes in wireless sensor networks is a difficult task. However, failure to identify and isolate compromised nodes results in significan...
Garth V. Crosby, Lance Hester, Niki Pissinou
IJNSEC
2011
77views more  IJNSEC 2011»
13 years 4 months ago
Performance Evaluation of the TSS Node Authentication Scheme in Noisy MANETs
This paper presents a description and performance evaluation of a threshold secret sharing (TSS) node authentication scheme in noisy mobile ad hoc networks (MANETs). The scheme ca...
Hussein Al-Bahadili, Shakir Hussain, Ghassan Issa,...
CORR
2010
Springer
142views Education» more  CORR 2010»
13 years 4 months ago
On the Benefit of Virtualization: Strategies for Flexible Server Allocation
Abstract--Virtualization technology facilitates a dynamic, demanddriven allocation and migration of servers. This paper studies how the flexibility offered by network virtualizatio...
Dushyant Arora, Anja Feldmann, Gregor Schaffrath, ...
TCS
2011
13 years 4 months ago
Highly concurrent multi-word synchronization
d Abstract) Hagit Attiya and Eshcar Hillel Department of Computer Science, Technion The design of concurrent data structures is greatly facilitated by the availability of synchroni...
Hagit Attiya, Eshcar Hillel
TMM
2011
177views more  TMM 2011»
13 years 4 months ago
MIMiC: Multimodal Interactive Motion Controller
Abstract—We introduce a new algorithm for real-time interactive motion control and demonstrate its application to motion captured data, pre-recorded videos and HCI. Firstly, a da...
Dumebi Okwechime, Eng-Jon Ong, Richard Bowden