Sciweavers

2814 search results - page 391 / 563
» Competitive Analysis of Distributed Algorithms
Sort
View
83
Voted
DCOSS
2010
Springer
15 years 2 months ago
Wireless Jamming Localization by Exploiting Nodes' Hearing Ranges
Jamming attacks are especially harmful when ensuring the dependability of wireless communication. Finding the position of a jammer will enable the network to actively exploit a wid...
Zhenhua Liu, Hongbo Liu, Wenyuan Xu, Yingying Chen
114
Voted
HIS
2007
15 years 1 months ago
Genetic Programming meets Model-Driven Development
Genetic programming is known to provide good solutions for many problems like the evolution of network protocols and distributed algorithms. In such cases it is most likely a hard...
Thomas Weise, Michael Zapf, Mohammad Ullah Khan, K...
CIIT
2004
104views Communications» more  CIIT 2004»
15 years 1 months ago
Semi-automatic compensation of the propagation delay in fault-tolerant systems
In control systems the jitter is a major problem since in a time-varying system the theoretical results for analysis and design of time-invariant systems cannot be used directly. ...
Thomas Losert, Wilfried Elmenreich, Martin Schlage...
106
Voted
DICTA
2003
15 years 1 months ago
Motion Field Estimation for Temporal Textures
This paper presents a novel approach for estimating the flow fields of dynamic temporal textures whose motion differs radically from that of rigid bodies. Our approach is based o...
David Edwards, Johnny T. Chang, Lin Shi, Yizhou Yu
CONEXT
2009
ACM
15 years 1 months ago
ThunderDome: discovering upload constraints using decentralized bandwidth tournaments
ThunderDome is a system for collaboratively measuring upload bandwidths in ad-hoc peer-to-peer systems. It works by scheduling bandwidth probes between pairs of hosts, wherein eac...
John R. Douceur, James W. Mickens, Thomas Moscibro...