Sciweavers

1594 search results - page 222 / 319
» An Algorithm to Compute Collusion Paths
Sort
View
DCOSS
2010
Springer
15 years 6 months ago
Wormholes No More? Localized Wormhole Detection and Prevention in Wireless Networks
A number of protocols have been proposed to date to defend against wormhole attacks in wireless networks by adopting synchronized clocks, positioning devices, or directional antenn...
Tassos Dimitriou, Thanassis Giannetsos
124
Voted
ACSC
2005
IEEE
15 years 9 months ago
A File Discovery Control Scheme for P2P File Sharing Applications in Wireless Mobile Environments
The mobility characteristic brings new challenges for research of P2P computing over the wireless mobile networking environment. Peers’ movements in wireless mobile network chan...
Chung-Ming Huang, Tz-Heng Hsu, Ming-Fa Hsu
ICRA
2002
IEEE
146views Robotics» more  ICRA 2002»
15 years 8 months ago
Real-Time Combinatorial Tracking of a Target Moving Unpredictably among Obstacles
Abstract—Many applications require continuous monitoring of a moving target by a controllable vision system. Although the goal of tracking objects is not new, traditional techniq...
Héctor H. González-Baños, Che...
148
Voted
COMSIS
2010
15 years 20 days ago
3D mesh skeleton extraction using prominent segmentation
Skeleton of 3D mesh is a fundamental shape feature, and is useful for shape description and other many applications in 3D Digital Geometry Processing. This paper presents a novel s...
Xiaopeng Sun, J. Pan, Xiaopeng Wei
HPCA
2009
IEEE
16 years 3 months ago
Blueshift: Designing processors for timing speculation from the ground up
Several recent processor designs have proposed to enhance performance by increasing the clock frequency to the point where timing faults occur, and by adding error-correcting supp...
Brian Greskamp, Lu Wan, Ulya R. Karpuzcu, Jeffrey ...