Sciweavers

2465 search results - page 320 / 493
» Distributed knowledge
Sort
View
INFOCOM
2010
IEEE
13 years 7 months ago
From Time Domain to Space Domain: Detecting Replica Attacks in Mobile Ad Hoc Networks
—A common vulnerability of wireless networks, in particular, the mobile ad hoc network (MANET), is their susceptibility to node compromise/physical capture attacks since the wire...
Kai Xing, Xiuzhen Cheng
INFOCOM
2005
IEEE
14 years 2 months ago
Joint optimal scheduling and routing for maximum network throughput
— In this paper we consider packet networks loaded by admissible traffic patterns, i.e. by traffic patterns that, if optimally routed, do not overload network resources. In the...
Emilio Leonardi, Marco Mellia, Marco Ajmone Marsan...
ICCV
1999
IEEE
14 years 11 months ago
Optimal Filters for Gradient-based Motion Estimation
Gradient based approaches for motion estimation (Optical-Flow) estimate the motion of an image sequence based on local changes in the image intensities. In order to best evaluate ...
Michael Elad, Patrick C. Teo, Yacov Hel-Or
INFOCOM
2007
IEEE
14 years 3 months ago
Optimal Pricing in a Free Market Wireless Network
We consider an ad-hoc wireless network operating within a free market economic model. Users send data over a choice of paths, and scheduling and routing decisions are updated dyna...
Michael J. Neely
STACS
2007
Springer
14 years 3 months ago
Broadcasting vs. Mixing and Information Dissemination on Cayley Graphs
One frequently studied problem in the context of information dissemination in communication networks is the broadcasting problem. In this paper, we study the following randomized b...
Robert Elsässer, Thomas Sauerwald