Sciweavers

2847 search results - page 569 / 570
» The Context-Dependent Role Model
Sort
View
INFOCOM
2011
IEEE
12 years 9 months ago
Risk sensitive optimal control framework applied to delay tolerant networks
—Epidemics dynamics can describe the dissemination of information in delay tolerant networks, in peer to peer networks and in content delivery networks. The control of such dynam...
Eitan Altman, Veeraruna Kavitha, Francesco De Pell...
INFOCOM
2011
IEEE
12 years 9 months ago
Understanding robustness of mobile networks through temporal network measures
—The application of complex network theory to communication systems has led to several important results. Nonetheless, previous research has often neglected to take into account ...
Salvatore Scellato, Ilias Leontiadis, Cecilia Masc...
ISI
2008
Springer
13 years 5 months ago
Real time intrusion prediction, detection and prevention programs
An Intrusion Detection Program (IDP) analyzes what happens or has happened during an execution and tries to find indications that the computer has been misused. In this talk, we p...
A. Abraham
ICIP
1997
IEEE
14 years 6 months ago
Image Coupling, Restoration and Enhancement via PDE's
We present a new approach based on Partial Differential Equations (PDE) to restore noisy blurred images. After studying the methods to denoise images, staying as close as possible...
Pierre Kornprobst, Rachid Deriche, Gilles Aubert
DSD
2002
IEEE
96views Hardware» more  DSD 2002»
13 years 10 months ago
Networks on Silicon: Blessing or Nightmare?
Continuing VLSI technology scaling raises several deep submicron (DSM) problems like relatively slow interconnect, power dissipation and distribution, and signal integrity. Those ...
Paul Wielage, Kees G. W. Goossens