Sciweavers

731 search results - page 106 / 147
» On the use of SHIM6 for mobility support in IMS networks
Sort
View
MOBIHOC
2007
ACM
14 years 9 months ago
Surviving attacks on disruption-tolerant networks without authentication
Disruption-Tolerant Networks (DTNs) deliver data in network environments composed of intermittently connected nodes. Just as in traditional networks, malicious nodes within a DTN ...
John Burgess, George Dean Bissias, Mark D. Corner,...
ISCC
2003
IEEE
14 years 2 months ago
On the Issues of IP Traceback for IPv6 and Mobile IPv6
As the Internet becomes pervasive, the vulnerability of some fundamental design aspects of the Internet has also become significant. Among which, Denial-of-Service (DoS) and Distr...
Henry C. J. Lee, Miao Ma, Vrizlynn L. L. Thing, Yi...
MASCOTS
2003
13 years 10 months ago
PEPA Nets
Abstract. In this paper we describe a formalism which uses the stochastic process algebra PEPA as the inscription language for labelled stochastic Petri nets. Viewed in another way...
Stephen Gilmore, Jane Hillston, Leïla Kloul
AMI
2009
Springer
14 years 3 months ago
Constructing Topological Maps of Displays with 3-D Positioning Information
Abstract. To better coordinate information displays with moving people and the environment, software must know the locations and three dimensional alignments of the display hardwar...
Donald J. Patterson
SMC
2010
IEEE
132views Control Systems» more  SMC 2010»
13 years 7 months ago
Selection of SIFT feature points for scene description in robot vision
This paper presents a method for selection of SIFT(Scale-Invariant Feature Transform) feature points using OC-SVM (One Class-Support Vector Machines). We proposed the method for au...
Yuya Utsumi, Masahiro Tsukada, Hirokazu Madokoro, ...