Sciweavers

3073 search results - page 552 / 615
» Real World Verification
Sort
View
IROS
2008
IEEE
151views Robotics» more  IROS 2008»
14 years 3 months ago
A performance sensitive hormone-inspired system for task distribution amongst evolving robots
— A hormone-inspired task scheduling method is described which assigns tasks to a group of robots, taking into account the robots’ performances. This method draws on previous w...
Joanne H. Walker, Myra S. Wilson
ISM
2008
IEEE
163views Multimedia» more  ISM 2008»
14 years 3 months ago
Cocktail Party on the Mobile
We present the architecture, user interface and prototype implementation of Fluid Voice, a proximity based mobile group communication system for opportunistic social exchanges. It...
Kwan Hong Lee, Andrew Lippman, Thiago Santos
IWNAS
2008
IEEE
14 years 3 months ago
POND: The Power of Zone Overlapping in DHT Networks
— Distributed Hash Table (DHT) based algorithms have been proposed to solve the routing issues in large-scale Peer-to-Peer (P2P) applications. DHT systems create an elegant Peer-...
Zhiyong Xu, Jizhong Han, Laxmi N. Bhuyan
MOBIQUITOUS
2008
IEEE
14 years 3 months ago
Exploiting Schelling behavior for improving data accessibility in mobile peer-to-peer networks
In 1969, Thomas Schelling proposed one of the most cited models in economics to explain how similar people (e.g. people with the same race, education, community) group together in...
Long Vu, Klara Nahrstedt, Matthias Hollick
SP
2008
IEEE
285views Security Privacy» more  SP 2008»
14 years 3 months ago
SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks
Decentralized distributed systems such as peer-to-peer systems are particularly vulnerable to sybil attacks, where a malicious user pretends to have multiple identities (called sy...
Haifeng Yu, Phillip B. Gibbons, Michael Kaminsky, ...