Sciweavers

1119 search results - page 134 / 224
» Computing in the Presence of Timing Failures
Sort
View
ICN
2007
Springer
14 years 1 months ago
Ring-Based Virtual Private Network Supporting a Large Number of VPNs
— In this paper, we propose a simple but effective VPN mechanism called RING-VPN (Ring-based Virtual Private Network) that realizes a high scalability in terms of the number of V...
Osamu Honda, Hiroyuki Ohsaki, Makoto Imase, Kazuhi...
MOBIHOC
2009
ACM
14 years 8 months ago
Aging rules: what does the past tell about the future in mobile ad-hoc networks?
The study in mobile ad-hoc networks (MANET) is facing challenges brought by recent discovery of non-exponential behavior of the inter-contact time distribution of mobile nodes. In...
Han Cai, Do Young Eun
ICDCSW
2005
IEEE
14 years 1 months ago
A Sensor-Based Tracking System Using Witnesses
— Search and rescue of people in emergency situations, e.g. lost hikers, stranded climbers, or injured skiers has been difficult due to lack of information about their location ...
Jyh-How Huang, Shivakant Mishra
SASN
2003
ACM
14 years 1 months ago
Modeling vulnerabilities of ad hoc routing protocols
The purpose of this work is to automate the analysis of ad hoc routing protocols in the presence of attackers. To this end, a formal model of protocol behavior is developed in whi...
Shahan Yang, John S. Baras
BMVC
2010
13 years 5 months ago
Probabilistic Latent Sequential Motifs: Discovering Temporal Activity Patterns in Video Scenes
This paper introduces a novel probabilistic activity modeling approach that mines recurrent sequential patterns from documents given as word-time occurrences. In this model, docum...
Jagannadan Varadarajan, Rémi Emonet, Jean-M...