Sciweavers

2874 search results - page 509 / 575
» Intrusion Detection: Systems and Models
Sort
View
ICC
2008
IEEE
143views Communications» more  ICC 2008»
14 years 4 months ago
A Closed-Form Expression for Static Worm-Scanning Strategies
—This work presents a closed-form expression for characterizing the spread of static worm-scanning strategies through a mean-field approximation. Our model can both accurately c...
Zesheng Chen, Chao Chen
IROS
2008
IEEE
181views Robotics» more  IROS 2008»
14 years 4 months ago
Scalable Bayesian human-robot cooperation in mobile sensor networks
— In this paper, scalable collaborative human-robot systems for information gathering applications are approached as a decentralized Bayesian sensor network problem. Humancompute...
Frédéric Bourgault, Aakash Chokshi, ...
ANSS
2007
IEEE
14 years 4 months ago
The JMT Simulator for Performance Evaluation of Non-Product-Form Queueing Networks
This paper describes JSIM: the simulation module of the Java Modelling Tools (JMT), an open-source fully-portable Java suite for capacity planning studies. The simulator has been ...
Marco Bertoli, Giuliano Casale, Giuseppe Serazzi
MUE
2007
IEEE
111views Multimedia» more  MUE 2007»
14 years 4 months ago
Securing the Pharmaceutical Supply Chain using RFID
RFID technology has been applied to a number of applications. In [5], a protocol was described how to apply RFID to currency to provide integrity (e.g. reduce counterfeiting) whil...
Brian King, Xiaolan Zhang 0003
ATAL
2007
Springer
14 years 4 months ago
An advanced bidding agent for advertisement selection on public displays
In this paper we present an advanced bidding agent that participates in first-price sealed bid auctions to allocate advertising space on BluScreen – an experimental public adve...
Alex Rogers, Esther David, Terry R. Payne, Nichola...