Sciweavers

319 search results - page 57 / 64
» Policy Distribution Methods for Function Parallel Firewalls
Sort
View
ISPA
2005
Springer
14 years 1 months ago
Hybrid Authentication and Key Management Scheme for WSANs
:Wireless Sensor and Actor Networks (WSANs) consist of three types of nodes with different capabilities and functions. Because of these heterogeneities, current network security ...
Xiaomei Cao, Mao Lin Huang, YueQuan Chen, Guihai C...
PG
2003
IEEE
14 years 1 months ago
Iso-Splatting: A Point-Based Alternative to Isosurface Visualization
We present a new approach to isosurface visualization that we call “iso-splatting.” We use point primitives for representing and rendering isosurfaces. The method consists of ...
Christopher S. Co, Bernd Hamann, Kenneth I. Joy
COLCOM
2007
IEEE
14 years 2 months ago
Collaborative motion planning of autonomous robots
—In disaster areas, office buildings, or at home, multiple autonomous networked mobile robots may act instead of human beings. These robots have to move to their destination so ...
Takashi Okada, Razvan Beuran, Junya Nakata, Yasuo ...
TPDS
1998
122views more  TPDS 1998»
13 years 7 months ago
Managing Statistical Behavior of Large Data Sets in Shared-Nothing Architectures
—Increasingly larger data sets are being stored in networked architectures. Many of the available data structures are not easily amenable to parallel realizations. Hashing scheme...
Isidore Rigoutsos, Alex Delis
IWLCS
2005
Springer
14 years 1 months ago
Counter Example for Q-Bucket-Brigade Under Prediction Problem
Aiming to clarify the convergence or divergence conditions for Learning Classifier System (LCS), this paper explores: (1) an extreme condition where the reinforcement process of ...
Atsushi Wada, Keiki Takadama, Katsunori Shimohara