Sciweavers

3095 search results - page 461 / 619
» Ubiquitous presence systems
Sort
View
SP
2009
IEEE
128views Security Privacy» more  SP 2009»
14 years 3 months ago
Quantifying Information Leaks in Outbound Web Traffic
As the Internet grows and network bandwidth continues to increase, administrators are faced with the task of keeping confidential information from leaving their networks. Today’...
Kevin Borders, Atul Prakash
RTSS
2009
IEEE
14 years 3 months ago
Integrating Proactive and Reactive Approaches for Robust Real-Time Data Services
— Real-time data services are needed in data-intensive real-time applications such as e-commerce or traffic control. However, it is challenging to support real-time data service...
Yan Zhou, Kyoung-Don Kang
ICRA
2009
IEEE
132views Robotics» more  ICRA 2009»
14 years 3 months ago
On connectivity maintenance in linear cyclic pursuit
— The paper studies the cyclic pursuit problem in presence of connectivity constraints among single-integrator agents. The robots, each one pursuing its leading neighbor along th...
Fabio Morbidi, Giulio Ripaccioli, Domenico Prattic...
INFOCOM
2009
IEEE
14 years 3 months ago
Decentralized Stochastic Control of Delay Tolerant Networks
—We study in this paper optimal stochastic control issues in delay tolerant networks. We first derive the structure of optimal two-hop forwarding policies. In order to be implem...
Eitan Altman, Giovanni Neglia, Francesco De Pelleg...
WDAG
2009
Springer
91views Algorithms» more  WDAG 2009»
14 years 3 months ago
Randomization Can Be a Healer: Consensus with Dynamic Omission Failures
Abstract. Wireless ad-hoc networks are being increasingly used in diverse contexts, ranging from casual meetings to disaster recovery operations. A promising approach is to model t...
Henrique Moniz, Nuno Ferreira Neves, Miguel Correi...