Sciweavers

1737 search results - page 67 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
JNW
2006
145views more  JNW 2006»
13 years 9 months ago
A Comparison of Replication Strategies for Reliable Decentralised Storage
Distributed hash tables (DHTs) can be used as the basis of a resilient lookup service in unstable environments: local routing tables are updated to reflected changes in the network...
Matthew Leslie, Jim Davies, Todd Huffman
ICIAP
2001
Springer
14 years 1 months ago
Neural Network Analysis of MINERVA Scene Analysis Benchmark
Scene analysis is an important area of research with the aim of identifying objects and their relationships in natural scenes. MINERVA benchmark has been recently introduced in th...
Markos Markou, Sameer Singh, Mona Sharma
ICRA
2003
IEEE
116views Robotics» more  ICRA 2003»
14 years 2 months ago
On the force capability of underactuated fingers
This paper studies the force capability of a particular class of underactuated fingers. Force capability is defined as the ability to create an external wrench onto a fixed obj...
Lionel Birglen, Clément Gosselin
ICPPW
2003
IEEE
14 years 2 months ago
Security Aspects of Wireless Heterogeneous Databases - Protocol, Performance, and Energy Analysis
Users have been demanding information “anytime, anywhere”. The notion of accessing diverse and autonomous information repositories with different APIs is not accepted. This ha...
Harshal Haridas, Ali R. Hurson, Yu Jiao
CORR
1998
Springer
184views Education» more  CORR 1998»
13 years 8 months ago
Case Study in Survivable Network System Analysis
This paper presents a method for analyzing the survivability of distributed network systems and an example of its application. Survivability is the capability of a system to fulfi...
Robert J. Ellison, Richard C. Linger, Thomas A. Lo...