Sciweavers

1266 search results - page 105 / 254
» Threat Evaluation Method for Distributed Network Environment
Sort
View
PDPTA
2003
15 years 5 months ago
The Performance of Routing Algorithms under Bursty Traffic Loads
Routing algorithms are traditionally evaluated under Poisson-like traffic distributions. This type of traffic is smooth over large time intervals and has been shown not necessaril...
Jeonghee Shin, Timothy Mark Pinkston
ECCV
1998
Springer
15 years 8 months ago
Stereo Vision-Based Navigation in Unknown Indoor Environment
Different applications in the field of vision-based navigation of autonomous mobile robots depend on the degree of knowledge of the environment. Indoor environment applications oft...
Oliver Schreer
CVPR
2010
IEEE
16 years 28 days ago
Parallel and Distributed Graph Cuts by Dual Decomposition
Graph cuts methods are at the core of many state-of-theart algorithms in computer vision due to their efficiency in computing globally optimal solutions. In this paper, we solve t...
Petter Strandmark, Fredrik Kahl
ECIS
2003
15 years 5 months ago
Development of a security methodology for cooperative information systems: the cooPSIS project
Since networks and computing systems are vital components of today's life, it is of utmost importance to endow them with the capability to survive physical and logical faults...
Mariagrazia Fugini, Mario Mezzanzanica
ICPP
2009
IEEE
15 years 11 months ago
A Heuristic for Mapping Virtual Machines and Links in Emulation Testbeds
Distributed system emulators provide a paramount platform for testing of network protocols and distributed applications in clusters and networks of workstations. However, to allow...
Rodrigo N. Calheiros, Rajkumar Buyya, César...