Sciweavers

1557 search results - page 290 / 312
» What can we do with a Solution
Sort
View
WIOPT
2005
IEEE
14 years 2 months ago
An Interactive Transparent Protocol for Connection Oriented Mobility -- Performance Analysis with Voice Traffic
Loss-Free handoff in Mobile Networks is an extensive research area. Mobile IP (MIP) provided a solution to enable a mobile node to roam from one location to another while maintain...
Raid Zaghal, Sandeep Davu, Javed I. Khan
DISCEX
2003
IEEE
14 years 2 months ago
Detecting Novel Scans Through Pattern Anomaly Detection
We introduce a technique for detecting anomalous patterns in a categorical feature (one that takes values from a finite alphabet). It differs from most anomaly detection methods u...
Alfonso Valdes
ICRA
2003
IEEE
165views Robotics» more  ICRA 2003»
14 years 2 months ago
Multi-robot task-allocation through vacancy chains
Existing task allocation algorithms generally do not consider the effects of task interaction, such as interference, but instead assume that tasks are independent. That assumptio...
Torbjørn S. Dahl, Maja J. Mataric, Gaurav S...
JOC
2007
133views more  JOC 2007»
13 years 8 months ago
Trapdoor Hard-to-Invert Group Isomorphisms and Their Application to Password-Based Authentication
In the security chain the weakest link is definitely the human one: human beings cannot remember long secrets and often resort to rather insecure solutions to keep track of their ...
Dario Catalano, David Pointcheval, Thomas Pornin
JOT
2010
97views more  JOT 2010»
13 years 7 months ago
Towards a theory and calculus of aliasing
A theory, graphical notation, mathematical calculus and implementation for finding whether two given expressions can, at execution time, denote references attached to the same obj...
Bertrand Meyer