Sciweavers

5752 search results - page 1038 / 1151
» Informative Labeling Schemes
Sort
View
SCN
2008
Springer
157views Communications» more  SCN 2008»
13 years 8 months ago
Insider attack attribution using signal strength-based hyperbolic location estimation
A rogue insider, in a wireless network, is an authenticated member that exploits possession of a valid identity in order to launch an attack. A typical example is the transmission...
Christine Laurendeau, Michel Barbeau
SIAMCO
2008
113views more  SIAMCO 2008»
13 years 8 months ago
Singularly Perturbed Piecewise Deterministic Games
Abstract. In this paper we consider a class of hybrid stochastic games with the piecewise openloop information structure. These games are indexed over a parameter which represents...
Alain Haurie, Francesco Moresino
PRL
2006
163views more  PRL 2006»
13 years 8 months ago
3D target recognition using cooperative feature map binding under Markov Chain Monte Carlo
A robust and effective feature map integration method is presented for infrared (IR) target recognition. Noise in an IR image makes a target recognition system unstable in pose es...
Sungho Kim, In-So Kweon
IJSN
2007
73views more  IJSN 2007»
13 years 8 months ago
Optimal worm-scanning method using vulnerable-host distributions
: Most Internet worms use random scanning. The distribution of vulnerable hosts on the Internet, however, is highly non-uniform over the IP-address space. This implies that random ...
Zesheng Chen, Chuanyi Ji
IJWET
2007
152views more  IJWET 2007»
13 years 8 months ago
Semantic web technologies for ubiquitous computing resource management in smart spaces
: Context-aware ubiquitous computing environments tend to be highly distributed and heterogeneous, while also featuring increased dynamism as elements, devices and middleware compo...
John Soldatos, Kostas Stamatis, Siamak Azodolmolky...
« Prev « First page 1038 / 1151 Last » Next »