Sciweavers

4378 search results - page 767 / 876
» An Evaluation Measure for Distributed Information Retrieval ...
Sort
View
INFOCOM
2006
IEEE
15 years 4 months ago
DDoS-Resilient Scheduling to Counter Application Layer Attacks Under Imperfect Detection
— Countering Distributed Denial of Service (DDoS) attacks is becoming ever more challenging with the vast resources and techniques increasingly available to attackers. In this pa...
Supranamaya Ranjan, Ram Swaminathan, Mustafa Uysal...
JSSPP
2005
Springer
15 years 3 months ago
Enhancing Security of Real-Time Applications on Grids Through Dynamic Scheduling
Real-time applications with security requirements are emerging in various areas including government, education, and business. The security sensitive real-time applications can ta...
Tao Xie 0004, Xiao Qin
IPSN
2003
Springer
15 years 3 months ago
Energy Based Acoustic Source Localization
A novel source localization approach using acoustic energy measurements from the individual sensors in the sensor field is presented. This new approach is based on the acoustic en...
Xiaohong Sheng, Yu Hen Hu
HRI
2007
ACM
15 years 1 months ago
Human control for cooperating robot teams
Human control of multiple robots has been characterized by the average demand of single robots on human attention or the distribution of demands from multiple robots. When robots ...
Jijun Wang, Michael Lewis
ACSAC
2006
IEEE
15 years 1 months ago
On Detecting Camouflaging Worm
Active worms pose major security threats to the Internet. In this paper, we investigate a new class of active worms, i.e., Camouflaging Worm (C-Worm in short). The C-Worm has the ...
Wei Yu, Xun Wang, Prasad Calyam, Dong Xuan, Wei Zh...