Sciweavers

5948 search results - page 1094 / 1190
» Computing Robust Counter-Strategies
Sort
View
123
Voted
MOBICOM
2005
ACM
15 years 8 months ago
Self-management in chaotic wireless deployments
Over the past few years, wireless networking technologies have made vast forays into our daily lives. Today, one can find 802.11 hardware and other personal wireless technology e...
Aditya Akella, Glenn Judd, Srinivasan Seshan, Pete...
SASN
2005
ACM
15 years 8 months ago
Key distribution and update for secure inter-group multicast communication
Group communication has become an important component in wireless networks. In this paper, we focus on the environments in which multiple groups coexist in the system, and both in...
Weichao Wang, Bharat K. Bhargava
143
Voted
ICCS
2005
Springer
15 years 8 months ago
High-Fidelity Simulation of Large-Scale Structures
Active structures capable of responding to external stimulii represent the emerging frontier in structural design. Robust and real-time sensing, control, and actuation pose fundame...
Christoph Hoffmann, Ahmed H. Sameh, Ananth Grama
RT
2005
Springer
15 years 8 months ago
Estimation of 3D Faces and Illumination from Single Photographs Using A Bilinear Illumination Model
3D Face modeling is still one of the biggest challenges in computer graphics. In this paper we present a novel framework that acquires the 3D shape, texture, pose and illumination...
Jinho Lee, Hanspeter Pfister, Baback Moghaddam, Ra...
IMC
2004
ACM
15 years 8 months ago
Availability, usage, and deployment characteristics of the domain name system
The Domain Name System (DNS) is a critical part of the Internet’s infrastructure, and is one of the few examples of a robust, highlyscalable, and operational distributed system....
Jeffrey Pang, James Hendricks, Aditya Akella, Robe...
« Prev « First page 1094 / 1190 Last » Next »