Sciweavers

164 search results - page 27 / 33
» Bootstrapping of Peer-to-Peer Networks
Sort
View
CN
2007
172views more  CN 2007»
14 years 9 months ago
Threshold cryptography in P2P and MANETs: The case of access control
Ad hoc groups, such as peer-to-peer (P2P) systems and mobile ad hoc networks (MANETs) represent recent technological advancements. They support low-cost, scalable and fault-tolera...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
TIP
2008
344views more  TIP 2008»
14 years 9 months ago
A Self-Organizing Approach to Background Subtraction for Visual Surveillance Applications
Detection of moving objects in video streams is the first relevant step of information extraction in many computer vision applications. Aside from the intrinsic usefulness of being...
Lucia Maddalena, Alfredo Petrosino
PERCOM
2010
ACM
14 years 7 months ago
Crowdsourced radiomap for room-level place recognition in urban environment
Abstract—The proliferation of WLAN infrastructures has facilitated numerous indoor localization techniques using WLAN fingerprints. In particular, identifying a room or a place i...
Minkyu Lee, Hyunil Yang, Dongsoo Han, Chansu Yu
CCR
2004
143views more  CCR 2004»
14 years 9 months ago
The cutting EDGE of IP router configuration
Abstract-- Human error in configuring routers undermines attempts to provide reliable, predictable end-to-end performance on IP networks. Manual configuration, while expensive and ...
Donald F. Caldwell, Anna Gilbert, Joel Gottlieb, A...
MOBICOM
2004
ACM
15 years 2 months ago
Architecture and techniques for diagnosing faults in IEEE 802.11 infrastructure networks
The wide-scale deployment of IEEE 802.11 wireless networks has generated significant challenges for Information Technology (IT) departments in corporations. Users frequently comp...
Atul Adya, Paramvir Bahl, Ranveer Chandra, Lili Qi...