Sciweavers

2827 search results - page 434 / 566
» Robustness of PSPACE-complete sets
Sort
View
124
Voted
INFOCOM
2006
IEEE
15 years 9 months ago
A Statistical Framework for Intrusion Detection in Ad Hoc Networks
— We focus on detecting intrusions in ad hoc networks using the misuse detection technique. We allow for detection modules that periodically fail to detect attacks and also gener...
Dhanant Subhadrabandhu, Saswati Sarkar, Farooq Anj...
123
Voted
INFOCOM
2006
IEEE
15 years 9 months ago
On Heterogeneous Overlay Construction and Random Node Selection in Unstructured P2P Networks
— Unstructured p2p and overlay network applications often require that a random graph be constructed, and that some form of random node selection take place over that graph. A ke...
Vivek Vishnumurthy, Paul Francis
122
Voted
INFOCOM
2006
IEEE
15 years 9 months ago
A Locating-First Approach for Scalable Overlay Multicast
— Recent proposals in multicast overlay construction have demonstrated the importance of exploiting underlying network topology. However, these topology-aware proposals often rel...
Mohamed Ali Kâafar, Thierry Turletti, Walid ...
122
Voted
IOLTS
2006
IEEE
101views Hardware» more  IOLTS 2006»
15 years 9 months ago
Delay Fault Localization in Test-Per-Scan BIST Using Built-In Delay Sensor
— Delay failures are becoming a dominant failure mechanism in nanometer technologies. Diagnosis of such failures is important to ensure yield and robustness of the design. Howeve...
Swaroop Ghosh, Swarup Bhunia, Arijit Raychowdhury,...
104
Voted
IPPS
2006
IEEE
15 years 9 months ago
On collaborative content distribution using multi-message gossip
We study epidemic schemes in the context of collaborative data delivery. In this context, multiple chunks of data reside at different nodes, and the challenge is to simultaneousl...
Yaacov Fernandess, Dahlia Malkhi