Sciweavers

60 search results - page 2 / 12
» Efficient Detection of Distributed Constraint Violations
Sort
View
COLCOM
2008
IEEE
13 years 6 months ago
SelectAudit: A Secure and Efficient Audit Framework for Networked Virtual Environments
Networked virtual environments (NVE) refer to the category of distributed applications that allow a large number of distributed users to interact with one or more central servers i...
Tuan Phan, Danfeng (Daphne) Yao
SIAMCOMP
2008
108views more  SIAMCOMP 2008»
13 years 4 months ago
A Primal-Dual Bicriteria Distributed Algorithm for Capacitated Vertex Cover
In this paper we consider the capacitated vertex cover problem which is the variant of vertex cover where each node is allowed to cover a limited number of edges. We present an ef...
Fabrizio Grandoni, Jochen Könemann, Alessandr...
CVPR
1999
IEEE
14 years 6 months ago
Independent Motion: The Importance of History
We consider a problem central in aerial visual surveillance applications { detection and tracking of small, independently moving objects in long and noisy video sequences. We dire...
Robert Pless, Tomás Brodský, Yiannis...
DFN
2003
13 years 6 months ago
High-Efficient Intrusion Detection Infrastructure
In recent years research activities in computer network security focus more actively on the development of effective methods in intrusion detection. The reason for this developmen...
Thomas Holz, Michael Meier, Hartmut König
ATAL
2011
Springer
12 years 4 months ago
Decomposing constraint systems: equivalences and computational properties
Distributed systems can often be modeled as a collection of distributed (system) variables whose values are constrained by a set of constraints. In distributed multi-agent systems...
Wiebe van der Hoek, Cees Witteveen, Michael Wooldr...