Sciweavers

1718 search results - page 276 / 344
» Simulating Network Robustness for Critical Infrastructure Ne...
Sort
View
129
Voted
ICRA
2008
IEEE
208views Robotics» more  ICRA 2008»
15 years 9 months ago
Unsupervised body scheme learning through self-perception
— In this paper, we present an approach allowing a robot to learn a generative model of its own physical body from scratch using self-perception with a single monocular camera. O...
Jürgen Sturm, Christian Plagemann, Wolfram Bu...
119
Voted
ACSAC
2007
IEEE
15 years 9 months ago
A Taxonomy of Botnet Structures
We propose a taxonomy of botnet structures, based on their utility to the botmaster. We propose key metrics to measure their utility for various activities (e.g., spam, ddos). Usi...
David Dagon, Guofei Gu, Christopher P. Lee, Wenke ...
114
Voted
EUROPAR
2007
Springer
15 years 9 months ago
Asynchronous Distributed Power Iteration with Gossip-Based Normalization
The dominant eigenvector of matrices defined by weighted links in overlay networks plays an important role in many peer-to-peer applications. Examples include trust management, im...
Márk Jelasity, Geoffrey Canright, Kenth Eng...
94
Voted
ICPADS
2005
IEEE
15 years 8 months ago
A Hint-Based Probabilistic Protocol for Unicast Communications in MANETs
Point-to-point transmissions represent a fundamental primitive in any communication network. Despite many proave appeared in the literature, providing an efficient implementation ...
Roberto Beraldi, Leonardo Querzoni, Roberto Baldon...
136
Voted
CCS
2010
ACM
15 years 3 months ago
Recruiting new tor relays with BRAIDS
Tor, a distributed Internet anonymizing system, relies on volunteers who run dedicated relays. Other than altruism, these volunteers have no incentive to run relays, causing a lar...
Rob Jansen, Nicholas Hopper, Yongdae Kim