Sciweavers

4307 search results - page 675 / 862
» Dynamic Spyware Analysis
Sort
View
P2P
2007
IEEE
14 years 4 months ago
A Data Placement Scheme with Time-Related Model for P2P Storages
Maintaining desired data availability while minimizing costs is the primary challenge in designing P2P storages. Data placement schemes and data availability calculation methods a...
Jing Tian, Zhi Yang, Yafei Dai
ICRA
2006
IEEE
156views Robotics» more  ICRA 2006»
14 years 4 months ago
Depth Perception in an Anthropomorphic Robot that replicates Human Eye Movements
— In the eyes of many species, the optical nodal points of the cornea and lens do not lie on the axes of rotation of the eye. During eye movements, this lack of alignment produce...
Fabrizio Santini, Michele Rucci
P2P
2006
IEEE
153views Communications» more  P2P 2006»
14 years 4 months ago
Internet-Scale Storage Systems under Churn -- A Study of the Steady-State using Markov Models
Content storage in a distributed collaborative environment uses redundancy for better resilience and thus provides good availability and durability. In a peer-to-peer environment,...
Anwitaman Datta, Karl Aberer
IMC
2006
ACM
14 years 4 months ago
Unexpected means of protocol inference
Network managers are inevitably called upon to associate network traffic with particular applications. Indeed, this operation is critical for a wide range of management functions...
Justin Ma, Kirill Levchenko, Christian Kreibich, S...
ITCC
2005
IEEE
14 years 3 months ago
A Framework for Key Management in Mobile Ad Hoc Networks
Background: Key management in a mobile ad hoc environment is complicated by frequently partitioning network topology. Recently proposed key management systems (KMSs) provide limit...
George C. Hadjichristofi, William Joseph Adams, Na...