Sciweavers

141 search results - page 25 / 29
» Topological Interpretation of Crossover
Sort
View
SP
2005
IEEE
156views Security Privacy» more  SP 2005»
14 years 28 days ago
Distributed Detection of Node Replication Attacks in Sensor Networks
The low-cost, off-the-shelf hardware components in unshielded sensor-network nodes leave them vulnerable to compromise. With little effort, an adversary may capture nodes, analyze...
Bryan Parno, Adrian Perrig, Virgil D. Gligor
SIGCOMM
2004
ACM
14 years 24 days ago
Locating internet routing instabilities
This paper presents a methodology for identifying the autonomous system (or systems) responsible when a routing change is observed and propagated by BGP. The origin of such a rout...
Anja Feldmann, Olaf Maennel, Zhuoqing Morley Mao, ...
IWCM
2004
Springer
14 years 22 days ago
Bayesian Approaches to Motion-Based Image and Video Segmentation
We present a variational approach for segmenting the image plane into regions of piecewise parametric motion given two or more frames from an image sequence. Our model is based on ...
Daniel Cremers
INFOVIS
2003
IEEE
14 years 19 days ago
Visualizing Evolving Networks: Minimum Spanning Trees versus Pathfinder Networks
Network evolution is a ubiquitous phenomenon in a wide variety of complex systems. There is an increasing interest in statistically modeling the evolution of complex networks such...
Chaomei Chen, Steven Morris
HPDC
1998
IEEE
13 years 11 months ago
A Resource Query Interface for Network-Aware Applications
Development of portable network-aware applications demands an interface to the network that allows an application to obtain information about its execution environment. This paper...
Bruce Lowekamp, Nancy Miller, Dean Sutherland, Tho...