Sciweavers

597 search results - page 99 / 120
» Long term tracking using Bayesian networks
Sort
View
SIGCOMM
1997
ACM
14 years 20 days ago
A Flow-Based Approach to Datagram Security
Datagram services provide a simple, exible, robust, and communication abstraction; their usefulness has been well demonstrated by the success of IP, UDP, and RPC. Yet, the overwh...
Suvo Mittra, Thomas Y. C. Woo
CORR
2010
Springer
118views Education» more  CORR 2010»
13 years 8 months ago
Large scale probabilistic available bandwidth estimation
The common utilization-based definition of available bandwidth and many of the existing tools to estimate it suffer from several important weaknesses: i) most tools report a point...
Frederic Thouin, Mark Coates, Michael G. Rabbat
MOBISYS
2007
ACM
14 years 8 months ago
Experiences of designing and deploying intelligent sensor nodes to monitor hand-arm vibrations in the field
The NEMO project is exploring the use of mobile sensor nodes to augment physical work artefacts in order to ensure compliance with health and safety regulations. In this paper we ...
Christos Efstratiou, Nigel Davies, Gerd Kortuem, J...
SASN
2003
ACM
14 years 1 months ago
Secure multicast groups on ad hoc networks
In this paper we address the problem of secure multicast of data streams over a multihop wireless ad hoc network. We propose a dynamic multicast group management protocol that aim...
Tansel Kaya, Guolong Lin, Guevara Noubir, A. Yilma...
CAV
2009
Springer
133views Hardware» more  CAV 2009»
14 years 9 months ago
Cardinality Abstraction for Declarative Networking Applications
ity Abstraction for Declarative Networking Applications Juan A. Navarro P?erez, Andrey Rybalchenko, and Atul Singh Max Planck Institute for Software Systems (MPI-SWS) Declarative N...
Andrey Rybalchenko, Atul Singh, Juan Antonio Navar...