Sciweavers

3095 search results - page 477 / 619
» Ubiquitous presence systems
Sort
View
USENIX
2007
13 years 11 months ago
A Comparison of Structured and Unstructured P2P Approaches to Heterogeneous Random Peer Selection
Random peer selection is used by numerous P2P applications; examples include application-level multicast, unstructured file sharing, and network location mapping. In most of thes...
Vivek Vishnumurthy, Paul Francis
USS
2008
13 years 11 months ago
Multi-flow Attacks Against Network Flow Watermarking Schemes
We analyze several recent schemes for watermarking network flows based on splitting the flow into intervals. We show that this approach creates time dependent correlations that en...
Negar Kiyavash, Amir Houmansadr, Nikita Borisov
CDC
2008
IEEE
154views Control Systems» more  CDC 2008»
13 years 11 months ago
Effect of topological dimension on rigidity of vehicle formations: Fundamental limitations of local feedback
We consider the role of topological dimension in problems of network consensus and vehicular formations where only local feedback is available. In particular, we consider the simpl...
Bassam Bamieh, Mihailo R. Jovanovic, Partha P. Mit...
DAGM
2008
Springer
13 years 10 months ago
Switching Linear Dynamic Models for Noise Robust In-Car Speech Recognition
Performance of speech recognition systems strongly degrades in the presence of background noise, like the driving noise in the interior of a car. We compare two different Kalman fi...
Björn Schuller, Martin Wöllmer, Tobias M...
ESOP
2008
Springer
13 years 10 months ago
Open Bisimulation for the Concurrent Constraint Pi-Calculus
Abstract. The concurrent constraint pi-calculus (cc-pi-calculus) has been introduced as a model for concluding Service Level Agreements. The cc-pi calculus combines the synchronous...
Maria Grazia Buscemi, Ugo Montanari