Sciweavers

1172 search results - page 77 / 235
» MIPv6 experimental evaluation using overlay networks
Sort
View
NCA
2003
IEEE
14 years 2 months ago
Adaptive Use of Network-Centric Mechanisms in Cyber-Defense
Attacks against distributed systems frequently start at the network layer by gathering network related information (such as open TCP ports) and continue on by exhausting resources...
Michael Atighetchi, Partha Pratim Pal, Franklin We...
IJNM
2008
131views more  IJNM 2008»
13 years 9 months ago
Using temporal correlation for fault localization in dynamically changing networks
A mobile ad-hoc network creates a dynamic environment where node mobility can cause periodic changes in routes. Most existing fault localization algorithms assume availability of ...
Maitreya Natu, Adarshpal S. Sethi
ACII
2005
Springer
14 years 2 months ago
Fist Tracking Using Bayesian Network
Abstract. This paper presents a Bayesian network based multi-cue fusion method for robust and real-time fist tracking. Firstly, a new strategy, which employs the latest work in fa...
Peng Lu, Yufeng Chen, Mandun Zhang, Yangsheng Wang
MM
2004
ACM
84views Multimedia» more  MM 2004»
14 years 2 months ago
Tools used while developing auracle: a voice-controlled networked instrument
Auracle is a networked sound instrument controlled by the voice. Users jam together over the Internet using only a microphone. Throughout the development process, the authors expe...
Kristjan Varnik, Jason Freeman, Chandrasekhar Rama...
INFOCOM
2010
IEEE
13 years 7 months ago
TopBT: A Topology-Aware and Infrastructure-Independent BitTorrent Client
—BitTorrent (BT) has carried out a significant and continuously increasing portion of Internet traffic. While several designs have been recently proposed and implemented to imp...
Shansi Ren, Enhua Tan, Tian Luo, Songqing Chen, Le...