Sciweavers

18924 search results - page 3439 / 3785
» Conformance of Distributed Systems
Sort
View
155
Voted
ACSAC
2006
IEEE
15 years 8 months ago
On Detecting Camouflaging Worm
Active worms pose major security threats to the Internet. In this paper, we investigate a new class of active worms, i.e., Camouflaging Worm (C-Worm in short). The C-Worm has the ...
Wei Yu, Xun Wang, Prasad Calyam, Dong Xuan, Wei Zh...
AINA
2004
IEEE
15 years 8 months ago
ZBP: A Zone-based Broadcasting Protocol for Wireless Sensor Networks
Abstract. Wireless Sensor Networks (WSNs) have been widely used in motoring and collecting interests of environment information. Packet flooding or broadcasting is an essential fun...
Chih-Yung Chang, Kuei-Ping Shih, Shih-Chieh Lee
AINA
2004
IEEE
15 years 8 months ago
Rich Metadata Searches Using the JXTA Content Manager Service
With the development of networking technologies and the advent of the peer-to-peer computing paradigm, distributed file-sharing systems like Gnutella are becoming prevalent over t...
Xin Xiang, Yuanchun Shi, Ling Guo
163
Voted
ALGOSENSORS
2004
Springer
15 years 8 months ago
Towards a Dynamical Model for Wireless Sensor Networks
In this paper we introduce a dynamical model for wireless sensor networks. We obtain a convergent martingale for the broadcast process in such networks. To our knowledge, such mart...
Pierre Leone, José D. P. Rolim
SIGGRAPH
2010
ACM
15 years 8 months ago
Motion-based video retargeting with optimized crop-and-warp
We introduce a video retargeting method that achieves high-quality resizing to arbitrary aspect ratios for complex videos containing diverse camera and dynamic motions. Previous c...
Yu-Shuen Wang, Hui-Chih Lin, Olga Sorkine, Tong-Ye...
« Prev « First page 3439 / 3785 Last » Next »