Sciweavers

147 search results - page 22 / 30
» Propagation Model of Active Worms in P2P Networks
Sort
View
CORR
2008
Springer
150views Education» more  CORR 2008»
13 years 7 months ago
A Local Mean Field Analysis of Security Investments in Networks
Getting agents in the Internet, and in networks in general, to invest in and deploy security features and protocols is a challenge, in particular because of economic reasons arisi...
Marc Lelarge, Jean Bolot
PERCOM
2004
ACM
14 years 7 months ago
Programming Pervasive and Mobile Computing Applications with the TOTA Middleware
Pervasive computing calls for suitable middleware and programming models to deal with large software systems dived in dynamic mobile network environments. Here we present the prog...
Marco Mamei, Franco Zambonelli
AINA
2007
IEEE
14 years 1 months ago
An Application-Driven MAC-layer Buffer Management with Active Dropping for Real-time Video Streaming in 802.16 Networks
— In this paper, we propose an application-driven MAC-layer buffer management framework based on a novel Active Dropping (AD) mechanism for real-time video streaming in IEEE 802....
James She, Fen Hou, Pin-Han Ho
CVIU
2006
317views more  CVIU 2006»
13 years 7 months ago
A general method for human activity recognition in video
In this paper we develop a system for human behaviour recognition in video sequences. Human behaviour is modelled as a stochastic sequence of actions. Actions are described by a f...
Neil Robertson, Ian D. Reid
SIGMETRICS
2008
ACM
119views Hardware» more  SIGMETRICS 2008»
13 years 7 months ago
Network externalities and the deployment of security features and protocols in the internet
Getting new security features and protocols to be widely adopted and deployed in the Internet has been a continuing challenge. There are several reasons for this, in particular ec...
Marc Lelarge, Jean Bolot