Sciweavers

2451 search results - page 380 / 491
» Effective View Navigation
Sort
View
INFOCOM
2009
IEEE
15 years 8 months ago
Diverse Routing in Networks with Probabilistic Failures
—We develop diverse routing schemes for dealing with multiple, possibly correlated, failures. While disjoint path protection can effectively deal with isolated single link failur...
Hyang-Won Lee, Eytan Modiano
AUSAI
2009
Springer
15 years 8 months ago
Probabilistic Seeking Prediction in P2P VoD Systems
In P2P VoD streaming systems, user behavior modeling is critical to help optimise user experience as well as system throughput. However, it still remains a challenging task due to ...
Weiwei Wang, Tianyin Xu, Yang Gao, Sanglu Lu
GBRPR
2009
Springer
15 years 8 months ago
Texture Segmentation by Contractive Decomposition and Planar Grouping
Abstract. Image segmentation has long been an important problem in the computer vision community. In our recent work we have addressed the problem of texture segmentation, where we...
Anders Bjorholm Dahl, Peter Bogunovich, Ali Shokou...
MDM
2009
Springer
126views Communications» more  MDM 2009»
15 years 8 months ago
Outlier Detection in Ad Hoc Networks Using Dempster-Shafer Theory
Mobile Ad-hoc NETworks (MANETs) are known to be vulnerable to a variety of attacks due to lack of central authority or fixed network infrastructure. Many security schemes have bee...
Wenjia Li, Anupam Joshi
112
Voted
HOST
2008
IEEE
15 years 8 months ago
Hardware Trojan Detection Using Path Delay Fingerprint
—Trusted IC design is a recently emerged topic since fabrication factories are moving worldwide in order to reduce cost. In order to get a low-cost but effective hardware Trojan ...
Yier Jin, Yiorgos Makris