Sciweavers

1434 search results - page 229 / 287
» Distributed Computing with Imperfect Randomness
Sort
View
DSN
2002
IEEE
14 years 18 days ago
Secure Intrusion-tolerant Replication on the Internet
This paper describes a Secure INtrusion-Tolerant Replication Architecture1 (SINTRA) for coordination in asynchronous networks subject to Byzantine faults. SINTRA supplies a number...
Christian Cachin, Jonathan A. Poritz
ICNP
2002
IEEE
14 years 18 days ago
Hybrid Channel Access Scheduling in Ad Hoc Networks
We present the hybrid activation multiple access (HAMA) protocol for ad hoc networks. Unlike previous channel access scheduling protocols that activate either nodes or links only,...
Lichun Bao, J. J. Garcia-Luna-Aceves
AINA
2010
IEEE
14 years 12 days ago
The Power of Orientation in Symmetry-Breaking
—Symmetry breaking is a fundamental operation in distributed computing. It has applications to important problems such as graph vertex and edge coloring, maximal independent sets...
Satya Krishna Pindiproli, Kishore Kothapalli
ACIVS
2007
Springer
13 years 11 months ago
A Multi-agent Approach for Range Image Segmentation with Bayesian Edge Regularization
Abstract. We present and evaluate in this paper a multi-agent approach for range image segmentation. The approach consists in using autonomous agents for the segmentation of a rang...
Smaine Mazouzi, Zahia Guessoum, Fabien Michel, Moh...
CAIP
2007
Springer
194views Image Analysis» more  CAIP 2007»
13 years 11 months ago
A New Wavelet-Based Texture Descriptor for Image Retrieval
This paper presents a novel texture descriptor based on the wavelet transform. First, we will consider vertical and horizontal coefficients at the same position as the components o...
Esther de Ves, Ana M. C. Ruedin, Daniel G. Acevedo...