Sciweavers

628 search results - page 104 / 126
» Scheduling Algorithm with Potential Behaviors
Sort
View
124
Voted
MDM
2009
Springer
126views Communications» more  MDM 2009»
15 years 9 months ago
Outlier Detection in Ad Hoc Networks Using Dempster-Shafer Theory
Mobile Ad-hoc NETworks (MANETs) are known to be vulnerable to a variety of attacks due to lack of central authority or fixed network infrastructure. Many security schemes have bee...
Wenjia Li, Anupam Joshi
IROS
2008
IEEE
151views Robotics» more  IROS 2008»
15 years 8 months ago
Transition-based RRT for path planning in continuous cost spaces
This paper presents a new method called Transition-based RRT (T-RRT) for path planning problems in continuous cost spaces. It combines the exploration strength of the RRT algorith...
Leonard Jaillet, Juan Cortés, Thierry Sim&e...
FBIT
2007
IEEE
15 years 8 months ago
Adaptive Data Dissemination in Sensor Networks Using WPDD
In Wireless Sensor Networks (WSNs), address-based routing approaches often lead to severe problems due to node mobility, energy-saving sleep-cycles, and often missing or unreliabl...
Falko Dressler, Reinhard German, Bettina Krüg...
INFOSCALE
2006
ACM
15 years 8 months ago
Simulating non-scanning worms on peer-to-peer networks
Millions of Internet users are using large-scale peerto-peer (P2P) networks to share content files today. Many other mission-critical applications, such as Internet telephony and...
Guanling Chen, Robert S. Gray
CC
2005
Springer
323views System Software» more  CC 2005»
15 years 8 months ago
CodeSurfer/x86-A Platform for Analyzing x86 Executables
CodeSurfer/x86 is a prototype system for analyzing x86 executables. It uses a static-analysis algorithm called value-set analysis (VSA) to recover intermediate representations that...
Gogul Balakrishnan, Radu Gruian, Thomas W. Reps, T...