Sciweavers

1448 search results - page 96 / 290
» Deadlock Detection in Distributed Systems
Sort
View
ACNS
2011
Springer
241views Cryptology» more  ACNS 2011»
13 years 1 months ago
Misuse Detection in Consent-Based Networks
Consent-based networking, which requires senders to have permission to send traffic, can protect against multiple attacks on the network. Highly dynamic networks like Mobile Ad-hoc...
Mansoor Alicherry, Angelos D. Keromytis
IPSN
2003
Springer
14 years 3 months ago
Detection, Classification, and Collaborative Tracking of Multiple Targets Using Video Sensors
The study of collaborative, distributed, real-time sensor networks is an emerging research area. Such networks are expected to play an essential role in a number of applications su...
Peshala V. Pahalawatta, Dejan Depalov, Thrasyvoulo...
DEBS
2010
ACM
14 years 2 months ago
Reliable complex event detection for pervasive computing
Complex event processing for pervasive computing must deal with various sources of error. In this paper, we focus on improving complex event detector handling of several types of ...
Dan O'Keeffe, Jean Bacon
ICIP
2008
IEEE
15 years 2 days ago
A master-slave approach for object detection and matching with fixed and mobile cameras
Typical object detection algorithms on mobile cameras suffer from the lack of a-priori knowledge on the object to be detected. The variability in the shape, pose, color distributi...
Alexandre Alahi, David Marimon, Michel Bierlaire, ...
IPPS
2009
IEEE
14 years 5 months ago
Using hardware transactional memory for data race detection
Abstract—Widespread emergence of multicore processors will spur development of parallel applications, exposing programmers to degrees of hardware concurrency hitherto unavailable...
Shantanu Gupta, Florin Sultan, Srihari Cadambi, Fr...