Sciweavers

589 search results - page 72 / 118
» Generalized Dominators and Post-Dominators
Sort
View
IMC
2009
ACM
15 years 6 months ago
One-click hosting services: a file-sharing hideout
File sharing using peer-to-peer (p2p) systems is a major Internet application and the leading source of network traffic today. However, the dominance of p2p systems for file sha...
Demetres Antoniades, Evangelos P. Markatos, Consta...
SIGCOMM
2009
ACM
15 years 6 months ago
PLUG: flexible lookup modules for rapid deployment of new protocols in high-speed routers
New protocols for the data link and network layer are being proposed to address limitations of current protocols in terms of scalability, security, and manageability. High-speed r...
Lorenzo De Carli, Yi Pan, Amit Kumar, Cristian Est...
ICRA
2007
IEEE
173views Robotics» more  ICRA 2007»
15 years 6 months ago
Reaction Mass Pendulum (RMP): An explicit model for centroidal angular momentum of humanoid robots
Abstract— A number of conceptually simple but behaviorrich “inverted pendulum” humanoid models have greatly enhanced the understanding and analytical insight of humanoid dyna...
Sung-Hee Lee, Ambarish Goswami
IPSN
2007
Springer
15 years 6 months ago
Robust message-passing for statistical inference in sensor networks
Large-scale sensor network applications require in-network processing and data fusion to compute statistically relevant summaries of the sensed measurements. This paper studies di...
Jeremy Schiff, Dominic Antonelli, Alexandros G. Di...
NOMS
2006
IEEE
189views Communications» more  NOMS 2006»
15 years 5 months ago
Analysis of Firewall Policy Rules Using Data Mining Techniques
— Firewall is the de facto core technology of today's network security and defense. However, the management of firewall rules has been proven to be complex, error-prone, cos...
Korosh Golnabi, Richard K. Min, Latifur Khan, Ehab...