Sciweavers

2584 search results - page 170 / 517
» On the Forward Checking Algorithm
Sort
View
CEC
2007
IEEE
14 years 7 days ago
Preventing selfish behavior in Ad Hoc networks
Cooperation enforcement is one of the key issues in ad hoc networks. In this paper we proposes a new strategy driven approach that aims at discouraging selfish behavior among netwo...
Marcin Seredynski, Pascal Bouvry, Mieczyslaw A. Kl...
WICON
2008
13 years 9 months ago
Stability regions of two-way relaying with network coding
We consider a pair of nodes with stochastic traffic flows who wish to communicate in a bi-directional communication scenario using intermediate relays in two-hop fashion. Intermed...
Ertugrul Necdet Ciftcioglu, Aylin Yener, Randall B...
PAMI
2008
175views more  PAMI 2008»
13 years 8 months ago
Discriminative Feature Co-Occurrence Selection for Object Detection
This paper describes an object detection framework that learns the discriminative co-occurrence of multiple features. Feature co-occurrences are automatically found by Sequential F...
Takeshi Mita, Toshimitsu Kaneko, Björn Stenge...
SIGCOMM
2010
ACM
13 years 6 months ago
Backpressure-based routing protocol for DTNs
In this paper we consider an alternative, highly agile approach called backpressure routing for Delay Tolerant Networks (DTN), in which routing and forwarding decisions are made o...
Amit Dvir, Athanasios V. Vasilakos
EPEW
2007
Springer
14 years 2 months ago
Evaluation of P2P Search Algorithms for Discovering Trust Paths
Abstract. Distributed security models based on a ‘web of trust’ eliminate single points of failure and alleviate performance bottlenecks. However, such distributed approaches r...
Emerson Ribeiro de Mello, Aad P. A. van Moorsel, J...