Sciweavers

4560 search results - page 901 / 912
» Finding Data in the Neighborhood
Sort
View
COMCOM
2008
95views more  COMCOM 2008»
13 years 7 months ago
PFC: A packet forwarding control scheme for vehicle handover over the ITS networks
When a vehicle moves on roads, it can receive messages from base stations (BSs) and other vehicles. After it moves far away the transmission range, the vehicle tries to find an av...
Chung-Ming Huang, Meng-Shu Chiang, Tz-Heng Hsu
COMCOM
2008
135views more  COMCOM 2008»
13 years 7 months ago
Peer-to-peer system-based active worm attacks: Modeling, analysis and defense
Active worms continue to pose major threats to the security of today's Internet. This is due to the ability of active worms to automatically propagate themselves and compromi...
Wei Yu, Sriram Chellappan, Xun Wang, Dong Xuan
GRID
2008
Springer
13 years 7 months ago
Statistical Analysis and Modeling of Jobs in a Grid Environment
The existence of good probabilistic models for the job arrival process and the delay components introduced at different stages of job processing in a Grid environment is important ...
Kostas Christodoulopoulos, Vasileios Gkamas, Emman...
TCSV
2008
125views more  TCSV 2008»
13 years 7 months ago
Exploring Co-Occurence Between Speech and Body Movement for Audio-Guided Video Localization
This paper presents a bottom-up approach that combines audio and video to simultaneously locate individual speakers in the video (2-D source localization) and segment their speech ...
H. Vajaria, S. Sarkar, R. Kasturi
ESEM
2010
ACM
13 years 6 months ago
Strengthening the empirical analysis of the relationship between Linus' Law and software security
Open source software is often considered to be secure because large developer communities can be leveraged to find and fix security vulnerabilities. Eric Raymond states Linus’ L...
Andrew Meneely, Laurie A. Williams