Sciweavers

1093 search results - page 162 / 219
» Probabilistic Location and Routing
Sort
View
CN
2004
163views more  CN 2004»
15 years 3 months ago
Highly reliable trust establishment scheme in ad hoc networks
Securing ad hoc networks in a fully self-organized way is effective and light-weight, but fails to accomplish trust initialization in many trust deficient scenarios. To overcome t...
Kui Ren, Tieyan Li, Zhiguo Wan, Feng Bao, Robert H...
MASS
2010
150views Communications» more  MASS 2010»
15 years 1 months ago
A non-replication multicasting scheme in delay tolerant networks
Delay tolerant networks (DTNs) are a special type of wireless mobile networks which may lack continuous network connectivity. Multicast is an important routing function that suppor...
Jie Wu, Yunsheng Wang
GW
2009
Springer
292views Biometrics» more  GW 2009»
15 years 1 months ago
To Beat or Not to Beat: Beat Gestures in Direction Giving
Research on gesture generation for embodied conversational agents (ECA's) mostly focuses on gesture types such as pointing and iconic gestures, while ignoring another gesture ...
Mariët Theune, Chris J. Brandhorst
INFOCOM
2011
IEEE
14 years 7 months ago
A robust optimization approach to backup network design with random failures
—This paper presents a scheme in which a dedicated backup network is designed to provide protection from random link failures. Upon a link failure in the primary network, traffi...
Matthew Johnston, Hyang-Won Lee, Eytan Modiano
ICCAD
2004
IEEE
102views Hardware» more  ICCAD 2004»
16 years 23 days ago
True crosstalk aware incremental placement with noise map
Crosstalk noise has become an important issue as technology scales down for timing and signal integrity closure. Existing works to fix crosstalk noise are mostly done at the rout...
Haoxing Ren, David Zhigang Pan, Paul Villarrubia