Sciweavers

734 search results - page 61 / 147
» Computer Virus Propagation Models
Sort
View
WIOPT
2005
IEEE
15 years 3 months ago
On the Predictability of Link Lifetimes in Urban MANETs
Link lifetime prediction is occurs frequently in MANET routing protocols. For example, in assigning cache timeout values and route durations, routing protocols make implicit predi...
Stephan Bohacek, Andjela Ilic, Vinay Sridhara
CVPR
2005
IEEE
15 years 3 months ago
Symmetric Stereo Matching for Occlusion Handling
In this paper, we propose a symmetric stereo model to handle occlusion in dense two-frame stereo. Our occlusion reasoning is directly based on the visibility constraint that is mo...
Jian Sun, Yin Li, Sing Bing Kang
ISAAC
2005
Springer
153views Algorithms» more  ISAAC 2005»
15 years 3 months ago
Network Game with Attacker and Protector Entities
Consider an information network with harmful procedures called attackers (e.g., viruses); each attacker uses a probability distribution to choose a node of the network to damage. O...
Marios Mavronicolas, Vicky G. Papadopoulou, Anna P...
HICSS
2006
IEEE
261views Biometrics» more  HICSS 2006»
15 years 3 months ago
e-Risk Management with Insurance: A Framework Using Copula Aided Bayesian Belief Networks
: e-business organizations are heavily dependent on distributed 24X7 robust information computing systems, for their daily operations. To secure distributed online transactions, th...
Arunabha Mukhopadhyay, Samir Chatterjee, Debashis ...
ICCSA
2009
Springer
15 years 4 months ago
YAO: A Software for Variational Data Assimilation Using Numerical Models
Variational data assimilation consists in estimating control parameters of a numerical model in order to minimize the misfit between the forecast values and some actual observatio...
Luigi Nardi, Charles Sorror, Fouad Badran, Sylvie ...