Sciweavers

1299 search results - page 235 / 260
» On a Theory of Media Processing Systems Behavior, with Appli...
Sort
View
DSN
2005
IEEE
14 years 1 months ago
Detecting Stealth Software with Strider GhostBuster
Stealth malware programs that silently infect enterprise and consumer machines are becoming a major threat to the future of the Internet [XZ04]. Resource hiding is a powerful stea...
Yi-Min Wang, Doug Beck, Binh Vo, Roussi Roussev, C...
MWCN
2004
Springer
14 years 1 months ago
Collaboration Enforcement and Adaptive Data Redirection in Mobile Ad Hoc Networks Using Only First-Hand Experience
: In Mobile Ad Hoc Networks (MANETs), all participating hosts are obligated to route and forward data for others to guarantee the availability of network applications and services....
Ning Jiang, Kien A. Hua, Mounir A. Tantaoui
ICRA
2002
IEEE
146views Robotics» more  ICRA 2002»
14 years 19 days ago
Algorithms and Sensors for Small Robot Path Following
Abstract— Tracked mobile robots in the 20 kg size class are under development for applications in urban reconnaissance. For efficient deployment, it is desirable for teams of ro...
Robert W. Hogg, Arturo L. Rankin, Stergios I. Roum...
INFOCOM
2000
IEEE
14 years 3 days ago
The Chaotic Nature of TCP Congestion Control
— In this paper we demonstrate how TCP congestion control can show chaotic behavior. We demonstrate the major features of chaotic systems in TCP/IP networks with examples. These ...
Andras Veres, Miklós Boda
SAC
2000
ACM
14 years 2 days ago
Parallel C++ for the Java Virtual Machine
Object-oriented modeling and design is a way of solving problems using models based upon real-world concepts. In this paradigm, the fundamental construct is the object, an entity ...
Timothy E. Denehy, Chang-Hyun Jo