Sciweavers

8499 search results - page 1484 / 1700
» network 2007
Sort
View
JPDC
2007
112views more  JPDC 2007»
13 years 10 months ago
CHEMAS: Identify suspect nodes in selective forwarding attacks
Selective forwarding attacks may corrupt some mission-critical applications such as military surveillance and forest fire monitoring in wireless sensor networks. In such attacks,...
Bin Xiao, Bo Yu, Chuanshan Gao
ECRTS
2007
IEEE
14 years 5 months ago
On Dominating Set Allocation Policies in Real-Time Wide-Area Distributed Systems
This paper investigates resource allocation policies for achieving real-time content distribution with subsecond delay bounds on the current Internet. Resource allocation in real-...
Chengdu Huang, Tarek F. Abdelzaher, Xue Liu
ICIP
2007
IEEE
14 years 5 months ago
Distributed Coding of Multiresolution Omnidirectional Images
This paper addresses the problem of compact representation of a 3D scene, captured by distributed omnidirectional cameras. As the images from the sensors are likely to be correlat...
Vijayaraghavan Thirumalai, Ivana Tosic, Pascal Fro...
ICOIN
2007
Springer
14 years 4 months ago
Inter-Domain Access Volume Model: Ranking Autonomous Systems
Exploring topological structure at Autonomous System (AS) level is indispensable for understanding most issues in Internet services. Previous models of AS graph involve address or ...
Yixuan Wang, Ye Wang, Maoke Chen, Xing Li
SSS
2007
Springer
14 years 4 months ago
The Truth System: Can a System of Lying Processes Stabilize?
We introduce a new abstract system, called the truth system. In the truth system, a process deduces a true value, with high probability, from an incoming stream of both true and fa...
Mohamed G. Gouda, Yan Li
« Prev « First page 1484 / 1700 Last » Next »