Sciweavers

17049 search results - page 3275 / 3410
» cans 2007
Sort
View
156
Voted
ICON
2007
IEEE
15 years 11 months ago
TEAM: Trust Enhanced Security Architecture for Mobile Ad-hoc Networks
— Security is paramount in Mobile Ad-hoc Networks (MANET) as they are not conducive to centralized trusted authorities. Several solutions have been proposed MANET in the areas of...
Venkatesan Balakrishnan, Vijay Varadharajan, Udaya...
149
Voted
ICPP
2007
IEEE
15 years 11 months ago
RECN-IQ: A Cost-Effective Input-Queued Switch Architecture with Congestion Management
As the number of computing and storage nodes keeps increasing, the interconnection network is becoming a key element of many computing and communication systems, where the overall...
Gaspar Mora, Pedro Javier García, Jose Flic...
ICPP
2007
IEEE
15 years 11 months ago
ASAP: An Advertisement-based Search Algorithm for Unstructured Peer-to-peer Systems
— Most of existing search algorithms for unstructured peer-to-peer (P2P) systems share one common approach: the requesting node sends out a query and the query message is repeate...
Peng Gu, Jun Wang, Hailong Cai
ICQNM
2007
IEEE
131views Chemistry» more  ICQNM 2007»
15 years 11 months ago
Comparison of two bounds of the quantum correlation set
— From a geometric viewpoint, quantum nonlocality between two parties is represented as the difference of two convex bodies, namely the sets of possible results of classical and ...
David Avis, Tsuyoshi Ito
ICRA
2007
IEEE
199views Robotics» more  ICRA 2007»
15 years 11 months ago
Automatic Outlier Detection: A Bayesian Approach
— In order to achieve reliable autonomous control in advanced robotic systems like entertainment robots, assistive robots, humanoid robots and autonomous vehicles, sensory data n...
Jo-Anne Ting, Aaron D'Souza, Stefan Schaal
« Prev « First page 3275 / 3410 Last » Next »