Sciweavers

4835 search results - page 905 / 967
» Holonic Simulation of a Design System for Performance Analys...
Sort
View
129
Voted
WS
2005
ACM
15 years 9 months ago
Group-based key pre-distribution in wireless sensor networks
Many key pre-distribution techniques have been developed recently to establish pairwise keys for wireless sensor networks. To further improve these schemes, researchers have propo...
Donggang Liu, Peng Ning, Wenliang Du
158
Voted
IEEEAMS
2003
IEEE
15 years 9 months ago
JAGR: An Autonomous Self-Recovering Application Server
This paper demonstrates that the dependability of generic, evolving J2EE applications can be enhanced through a combination of a few recovery-oriented techniques. Our goal is to r...
George Candea, Emre Kiciman, Steve Zhang, Pedram K...
135
Voted
MM
2003
ACM
145views Multimedia» more  MM 2003»
15 years 9 months ago
Proscenium: a framework for spatio-temporal video editing
We present an approach to video editing where movie sequences are treated as spatio-temporal volumes that can be sheered and warped under user control. This simple capability enab...
Eric P. Bennett, Leonard McMillan
AIIDE
2008
15 years 6 months ago
A Cover-Based Approach to Multi-Agent Moving Target Pursuit
We explore the task of designing an efficient multi-agent system that is capable of capturing a single moving target, assuming that every agent knows the location of all agents on...
Alejandro Isaza, Jieshan Lu, Vadim Bulitko, Russel...
BCS
2008
15 years 5 months ago
Tools for Traceable Security Verification
Dependable systems evolution has been identified by the UK Computing Research Committee (UKCRC) as one of the current grand challenges for computer science. We present work toward...
Jan Jürjens, Yijun Yu, Andreas Bauer 0002