Sciweavers

285 search results - page 32 / 57
» Making Fourier-envelope simulation robust
Sort
View
SRDS
2007
IEEE
14 years 2 months ago
Activity Monitoring to Guarantee File Availability in Structured P2P File-sharing Systems
A cooperative structured peer-to-peer file-sharing system requires that the nodes participating in the system need to maintain the location mappings of other nodes. However, the s...
Guowei Huang, Zhi Chen, Qi Zhao, Gongyi Wu
GLOBECOM
2006
IEEE
14 years 1 months ago
Wormhole Attack in Wireless Ad Hoc Networks: Analysis and Countermeasure
— The wormhole attack is one of the most severe security attacks in wireless ad hoc networks. In this paper, we analyze the effect of the wormhole attack in shortest path routing...
Majid Khabbazian, Hugues Mercier, Vijay K. Bhargav...
CIARP
2005
Springer
14 years 1 months ago
Recognition of Note Onsets in Digital Music Using Semitone Bands
A simple note onset detection system for music is presented in this work. To detect onsets, a 1/12 octave filterbank is simulated in the frequency domain and the band derivatives ...
Antonio Pertusa, Anssi Klapuri, José Manuel...
ISPA
2005
Springer
14 years 1 months ago
Decoupling Service and Feedback Trust in a Peer-to-Peer Reputation System
Abstract. Reputation systems help peers decide whom to trust before undertaking a transaction. Conventional approaches to reputation-based trust modeling assume that peers reputed ...
Gayatri Swamynathan, Ben Y. Zhao, Kevin C. Almerot...
KIVS
2005
Springer
14 years 1 months ago
Router Aided Congestion Avoidance with Scalable Performance Signaling
This paper justifies using explicit performance signaling in support of congestion control by means of a simple yet efficient scheme called “Congestion Avoidance with Distribute...
Michael Welzl