Sciweavers

4255 search results - page 755 / 851
» Cover
Sort
View
ISAAC
2005
Springer
153views Algorithms» more  ISAAC 2005»
15 years 5 months ago
Network Game with Attacker and Protector Entities
Consider an information network with harmful procedures called attackers (e.g., viruses); each attacker uses a probability distribution to choose a node of the network to damage. O...
Marios Mavronicolas, Vicky G. Papadopoulou, Anna P...
ISMIR
2005
Springer
152views Music» more  ISMIR 2005»
15 years 5 months ago
ATTA: Automatic Time-Span Tree Analyzer Based on Extended GTTM
This paper describes a music analyzing system called the automatic time-span tree analyzer (ATTA), which we have developed. The ATTA derives a time-span tree that assigns a hierar...
Masatoshi Hamanaka, Keiji Hirata, Satoshi Tojo
IWDC
2005
Springer
138views Communications» more  IWDC 2005»
15 years 5 months ago
Hierarchical Routing in Sensor Networks Using k-Dominating Sets
For a connected graph, representing a sensor network, distributed algorithms for the Set Covering Problem can be employed to construct reasonably small subsets of the nodes, calle...
Michael Q. Rieck, Subhankar Dhar
RAID
2005
Springer
15 years 5 months ago
Sequence Number-Based MAC Address Spoof Detection
Abstract. The exponential growth in the deployment of IEEE 802.11based wireless LAN (WLAN) in enterprises and homes makes WLAN an attractive target for attackers. Attacks that expl...
Fanglu Guo, Tzi-cker Chiueh
ROBOCUP
2005
Springer
123views Robotics» more  ROBOCUP 2005»
15 years 5 months ago
Mobile Robot Communication Without the Drawbacks of Wireless Networking
Abstract. The default solution for mobile robot communication is RFnetworking, typically based on one of the IEEE 802.11 standards also known as WLAN technology. Radio communicatio...
Andreas Birk 0002, Cosmin Condea