Sciweavers

4835 search results - page 905 / 967
» Holonic Simulation of a Design System for Performance Analys...
Sort
View
WS
2005
ACM
14 years 2 months ago
Group-based key pre-distribution in wireless sensor networks
Many key pre-distribution techniques have been developed recently to establish pairwise keys for wireless sensor networks. To further improve these schemes, researchers have propo...
Donggang Liu, Peng Ning, Wenliang Du
IEEEAMS
2003
IEEE
14 years 2 months ago
JAGR: An Autonomous Self-Recovering Application Server
This paper demonstrates that the dependability of generic, evolving J2EE applications can be enhanced through a combination of a few recovery-oriented techniques. Our goal is to r...
George Candea, Emre Kiciman, Steve Zhang, Pedram K...
MM
2003
ACM
145views Multimedia» more  MM 2003»
14 years 2 months ago
Proscenium: a framework for spatio-temporal video editing
We present an approach to video editing where movie sequences are treated as spatio-temporal volumes that can be sheered and warped under user control. This simple capability enab...
Eric P. Bennett, Leonard McMillan
AIIDE
2008
13 years 11 months ago
A Cover-Based Approach to Multi-Agent Moving Target Pursuit
We explore the task of designing an efficient multi-agent system that is capable of capturing a single moving target, assuming that every agent knows the location of all agents on...
Alejandro Isaza, Jieshan Lu, Vadim Bulitko, Russel...
BCS
2008
13 years 10 months ago
Tools for Traceable Security Verification
Dependable systems evolution has been identified by the UK Computing Research Committee (UKCRC) as one of the current grand challenges for computer science. We present work toward...
Jan Jürjens, Yijun Yu, Andreas Bauer 0002