Sciweavers

950 search results - page 165 / 190
» presence 2008
Sort
View
COMCOM
2008
84views more  COMCOM 2008»
13 years 9 months ago
SecureStream: An intrusion-tolerant protocol for live-streaming dissemination
Peer-to-peer (P2P) dissemination systems are vulnerable to attacks that may impede nodes from receiving data in which they are interested. The same properties that lead P2P system...
Maya Haridasan, Robbert van Renesse
COMCOM
2008
145views more  COMCOM 2008»
13 years 9 months ago
A game-theoretic intrusion detection model for mobile ad hoc networks
In this paper, we address the problem of increasing the effectiveness of an intrusion detection system (IDS) for a cluster of nodes in ad hoc networks. To reduce the performance o...
Hadi Otrok, Noman Mohammed, Lingyu Wang, Mourad De...
CONNECTION
2008
178views more  CONNECTION 2008»
13 years 9 months ago
Spoken language interaction with model uncertainty: an adaptive human-robot interaction system
Spoken language is one of the most intuitive forms of interaction between humans and agents. Unfortunately, agents that interact with people using natural language often experienc...
Finale Doshi, Nicholas Roy
CPHYSICS
2008
96views more  CPHYSICS 2008»
13 years 9 months ago
Moment distributions of clusters and molecules in the adiabatic rotor model
We present a Fortran program to compute the distribution of dipole moments of free particles for use in analyzing molecular beams experiments that measure moments by deflection in...
G. E. Ballentine, G. F. Bertsch, N. Onishi, K. Yab...
DAM
2008
136views more  DAM 2008»
13 years 9 months ago
General theory of information transfer: Updated
We report on ideas, problems and results, which occupied us during the past decade and which seem to extend the frontiers of information theory in several directions. The main con...
Rudolf Ahlswede