Sciweavers

2503 search results - page 339 / 501
» Building Computer Network Attacks
Sort
View
ESA
2009
Springer
111views Algorithms» more  ESA 2009»
15 years 8 months ago
Exact and Approximate Equilibria for Optimal Group Network Formation
We consider a process called Group Network Formation Game, which represents the scenario when strategic agents are building a network together. In our game, agents can have extrem...
Elliot Anshelevich, Bugra Caskurlu
SIGCOMM
2009
ACM
15 years 8 months ago
Crossbow: from hardware virtualized NICs to virtualized networks
This paper describes a new architecture for achieving network virtualization using virtual NICs (VNICs) as the building blocks. The VNICs can be associated with dedicated and inde...
Sunay Tripathi, Nicolas Droux, Thirumalai Srinivas...
CRV
2007
IEEE
127views Robotics» more  CRV 2007»
15 years 8 months ago
Extrinsic Recalibration in Camera Networks
This work addresses the practical problem of keeping a camera network calibrated during a recording session. When dealing with real-time applications, a robust calibration of the ...
Chris Hermans, Maarten Dumont, Philippe Bekaert
IJCNN
2007
IEEE
15 years 8 months ago
Risk Assessment Algorithms Based on Recursive Neural Networks
— The assessment of highly-risky situations at road intersections have been recently revealed as an important research topic within the context of the automotive industry. In thi...
Alejandro Chinea Manrique De Lara, Michel Parent
PERCOM
2006
ACM
15 years 7 months ago
DHT-based Unicast for Mobile Ad Hoc Networks
As mobile ad hoc networks (MANETs) become ever more popular, it also becomes more and more interesting to build distributed network applications (e.g. data storage, etc.) that hav...
Thomas Zahn, Jochen H. Schiller