Sciweavers

2200 search results - page 151 / 440
» Hop Integrity in Computer Networks
Sort
View
GECCO
2005
Springer
160views Optimization» more  GECCO 2005»
15 years 8 months ago
Designing resilient networks using a hybrid genetic algorithm approach
As high-speed networks have proliferated across the globe, their topologies have become sparser due to the increased capacity of communication media and cost considerations. Relia...
Abdullah Konak, Alice E. Smith
118
Voted
ICCV
2007
IEEE
16 years 4 months ago
Shape and Appearance Context Modeling
In this work we develop appearance models for computing the similarity between image regions containing deformable objects of a given class in realtime. We introduce the concept o...
Gianfranco Doretto, Jens Rittscher, Peter H. Tu, T...
CONTEXT
2001
Springer
15 years 7 months ago
A Connectionist-Symbolic Approach to Modeling Agent Behavior: Neural Networks Grouped by Contexts
A recent report by the National Research Council (NRC) declares neural networks “hold the most promise for providing powerful learning models”. While some researchers have expe...
Amy E. Henninger, Avelino J. Gonzalez, Michael Geo...
CONEXT
2008
ACM
15 years 4 months ago
ALPHA: an adaptive and lightweight protocol for hop-by-hop authentication
Wireless multi-hop networks are particularly susceptible to attacks based on flooding and the interception, tampering with, and forging of packets. Thus, reliable communication in...
Tobias Heer, Stefan Götz, Oscar García...
103
Voted
IADIS
2004
15 years 3 months ago
Developing pervasive services for future telecommunication networks
Pervasive computing promises a new and radically improved paradigm for user interaction with services and applications. Although mainstream research and development in this area i...
Babak A. Farshchian, Josip Zoric, Lars Mehrmann, A...