Sciweavers

4859 search results - page 848 / 972
» Distributed Computing in a Heterogeneous Computing Environme...
Sort
View
JDCTA
2010
139views more  JDCTA 2010»
14 years 10 months ago
Tracing Anonymous Mobile Attackers in Wireless Network
In a flooding-based distributed denial-of-service (DDoS) attack, an adversary attempts to exhaust a target's computing resource. To detect DDoS attacks in a network environme...
Ming Hour Yang, Shiuhpyng Shieh
CEC
2010
IEEE
14 years 6 months ago
Co-evolutionary search path planning under constrained information-sharing for a cooperative unmanned aerial vehicle team
—Mobile cooperative sensor networks are increasingly used for surveillance and reconnaissance tasks to support domain picture compilation. However, efficient distributed informat...
Jean Berger, Jens Happe
ICRA
2005
IEEE
210views Robotics» more  ICRA 2005»
15 years 8 months ago
Improving Grid-based SLAM with Rao-Blackwellized Particle Filters by Adaptive Proposals and Selective Resampling
— Recently Rao-Blackwellized particle filters have been introduced as effective means to solve the simultaneous localization and mapping (SLAM) problem. This approach uses a par...
Giorgio Grisetti, Cyrill Stachniss, Wolfram Burgar...
DFT
2003
IEEE
99views VLSI» more  DFT 2003»
15 years 8 months ago
Dependability Analysis of CAN Networks: An Emulation-Based Approach
1 Today many safety-critical applications are based on distributed systems where several computing nodes exchange information via suitable network interconnections. An example of t...
J. Pérez, Matteo Sonza Reorda, Massimo Viol...
ADHOC
2007
126views more  ADHOC 2007»
15 years 3 months ago
Energy-aware routing in sensor networks: A large system approach
In many sensor networking environments, the sensor nodes have limited battery capacity and processing power. Hence, it is imperative to develop solutions that are energy-efficient...
Longbi Lin, Ness B. Shroff, R. Srikant