Sciweavers

1205 search results - page 205 / 241
» Efficient robust optimization for robust control with constr...
Sort
View
CCS
2006
ACM
14 years 16 days ago
Fortifying password authentication in integrated healthcare delivery systems
Integrated Delivery Systems (IDSs) now become a primary means of care provision in healthcare domain. However, existing password systems (under either the single-server model or t...
Yanjiang Yang, Robert H. Deng, Feng Bao
GRAPHICSINTERFACE
2007
13 years 10 months ago
A GPU based interactive modeling approach to designing fine level features
In this paper we propose a GPU based interactive geometric modeling approach to designing fine level features on subdivision surfaces. Displacement mapping is a technique for addi...
Xin Huang, Sheng Li, Guoping Wang
CIIT
2004
111views Communications» more  CIIT 2004»
13 years 10 months ago
Scalable ant-based routing algorithm for ad-hoc networks
Ants-based routing algorithms have attracted the attention of researchers because they are more robust, reliable, and scalable than other conventional routing algorithms. Since th...
Yoshitaka Ohtaki, Naoki Wakamiya, Masayuki Murata,...
CORR
2010
Springer
432views Education» more  CORR 2010»
13 years 9 months ago
A Distributed Trust Management Framework for Detecting Malicious Packet Dropping Nodes in a Mobile Ad Hoc Network
In a multi-hop mobile ad hoc network (MANET) mobile nodes communicate with each other forming a cooperative radio network. Security remains a major challenge for these networks du...
Jaydip Sen
NETWORK
2008
106views more  NETWORK 2008»
13 years 8 months ago
Toward internet-wide multipath routing
The Internet would be more efficient and robust if routers could flexibly divide traffic over multiple paths. Often, having one or two extra paths is sufficient for customizing pa...
Jiayue He, Jennifer Rexford