Sciweavers

3638 search results - page 233 / 728
» Distribution chain security
Sort
View
CCS
2008
ACM
15 years 7 months ago
SEAR: a secure efficient ad hoc on demand routing protocol for wireless networks
Multi-hop routing is essential to the operation of wireless ad hoc networks. Unfortunately, it is very easy for an adversary to forge or modify routing messages to inflict severe ...
Qing Li, Yih-Chun Hu, Meiyuan Zhao, Adrian Perrig,...
DSN
2007
IEEE
15 years 11 months ago
Variational Bayesian Approach for Interval Estimation of NHPP-Based Software Reliability Models
In this paper, we present a variational Bayesian (VB) approach to computing the interval estimates for nonhomogeneous Poisson process (NHPP) software reliability models. This appr...
Hiroyuki Okamura, Michael Grottke, Tadashi Dohi, K...
ASAP
2005
IEEE
87views Hardware» more  ASAP 2005»
15 years 11 months ago
Expression Synthesis in Process Networks generated by LAURA
The COMPAAN/LAURA [18] tool chain maps nested loop applications written in Matlab onto reconfigurable platforms, such as FPGAs. COMPAAN rewrites the original Matlab application a...
Claudiu Zissulescu, Bart Kienhuis, Ed F. Depretter...
ICCV
2005
IEEE
15 years 11 months ago
Consistent Segmentation for Optical Flow Estimation
In this paper, we propose a method for jointly computing optical flow and segmenting video while accounting for mixed pixels (matting). Our method is based on statistical modelin...
C. Lawrence Zitnick, Nebojsa Jojic, Sing Bing Kang
ICDCS
1998
IEEE
15 years 9 months ago
Improved Lightpath (Wavelength) Routing in Large WDM Networks
We address the problem of efficient circuit switching in wide area networks. The solution provided is based on finding optimal routes for lightpaths and semilightpaths. A lightpat...
Weifa Liang, George Havas, Xiaojun Shen