Sciweavers

5948 search results - page 265 / 1190
» Computing Robust Counter-Strategies
Sort
View
INFOCOM
2008
IEEE
15 years 10 months ago
Towards a Theory of Robust Localization Against Malicious Beacon Nodes
—Localization in the presence of malicious beacon nodes is an important problem in wireless networks. Although significant progress has been made on this problem, some fundament...
Sheng Zhong, Murtuza Jadliwala, Shambhu J. Upadhya...
WCNC
2008
IEEE
15 years 10 months ago
Link-Diversity Routing: A Robust Routing Paradigm for Mobile Ad Hoc Networks
—We present link-diversity routing, a routing paradigm that achieves high path resilience in mobile ad hoc networks. Link-diversity routing chooses each hop of a packet’s route...
Vincent Lenders, Rainer Baumann
COMSWARE
2007
IEEE
15 years 10 months ago
Scalable Multicast Platforms for a New Generation of Robust Distributed Applications
1 As distributed systems scale up and are deployed into increasingly sensitive settings, demand is rising for a new generation of communications middleware in support of applicati...
Ken Birman, Mahesh Balakrishnan, Danny Dolev, Tudo...
EVOW
2007
Springer
15 years 10 months ago
Robust Peak Detection and Alignment of nanoLC-FT Mass Spectrometry Data
In liquid chromatography-mass spectrometry (LC-MS) based expression proteomics, samples from different groups are analyzed comparatively in order to detect differences that can p...
Marius C. Codrea, Connie R. Jimenez, Sander R. Pie...
IH
2007
Springer
15 years 10 months ago
Software Integrity Checking Expressions (ICEs) for Robust Tamper Detection
Abstract. We introduce software integrity checking expressions (SoftICEs), which are program predicates that can be used in software tamper detection. We present two candidates, pr...
Mariusz H. Jakubowski, Prasad Naldurg, Vijay Patan...