Sciweavers

359 search results - page 57 / 72
» Testing Periodicity
Sort
View
LISA
2000
13 years 10 months ago
Tracing Anonymous Packets to Their Approximate Source
Most denial-of-service attacks are characterized by a flood of packets with random, apparently valid source addresses. These addresses are spoofed, created by a malicious program ...
Hal Burch, Bill Cheswick
ATAL
2009
Springer
14 years 3 months ago
Comparing trust mechanisms for monitoring aggregator nodes in sensor networks
Sensor nodes are often used to collect data from locations inaccessible or hazardous for humans. As they are not under normal supervision, these nodes are particularly susceptible...
Oly Mistry, Anil Gürsel, Sandip Sen
JIRS
2007
162views more  JIRS 2007»
13 years 8 months ago
Walking Control Algorithm of Biped Humanoid Robot on Uneven and Inclined Floor
This paper describes walking control algorithm for the stable walking of a biped humanoid robot on an uneven and inclined floor. Many walking control techniques have been develope...
Jung-Yup Kim, Ill-Woo Park, Jun-Ho Oh
IBPRIA
2005
Springer
14 years 2 months ago
Monte Carlo Localization Using SIFT Features
The ability of finding its situation in a given environment is crucial for an autonomous agent. While navigating through a space, a mobile robot must be capable of finding its lo...
Arturo Gil, Óscar Reinoso, Maria Asunci&oac...
CONCUR
2000
Springer
14 years 9 days ago
Reachability Analysis for Some Models of Infinite-State Transition Systems
We introduce some new models of infinite-state transition systems. The basic model, called a (reversal-bounded) counter machine (CM), is a nondeterministic finite automaton augment...
Oscar H. Ibarra, Tevfik Bultan, Jianwen Su