Sciweavers

2663 search results - page 103 / 533
» How to Choose a Timing Model
Sort
View
WINET
2010
159views more  WINET 2010»
15 years 3 months ago
Approximation algorithm for minimal convergecast time problem in wireless sensor networks
In this paper we consider how to collect data from sensors deployed in the Euclidean plane in a timeefficient way. We assume that all sensors could adjust their transmission range...
Weiping Shang, Peng-Jun Wan, Xiaodong Hu
MOBIHOC
2006
ACM
16 years 4 months ago
Modeling steady-state and transient behaviors of user mobility: : formulation, analysis, and application
Recent studies on mobility modeling have focused on characterizing user mobility from real traces of wireless LANs (WLANs) and creating mobility models based on such characterizat...
Jong-Kwon Lee, Jennifer C. Hou
136
Voted
IVA
2005
Springer
15 years 10 months ago
Hierarchical Motion Controllers for Real-Time Autonomous Virtual Humans
Abstract. Continuous and synchronized whole-body motions are essential for achieving believable autonomous virtual humans in interactive applications. We present a new motion contr...
Marcelo Kallmann, Stacy Marsella
144
Voted
IJNSEC
2008
96views more  IJNSEC 2008»
15 years 5 months ago
On the Effectiveness of Continuous-Time Mixes under Flow-Correlation Based Anonymity Attacks
In flow-based mix networks, flow correlation attacks have been proposed earlier and have been shown empirically to seriously degrade mix-based anonymous communication systems. In ...
Ye Zhu, Xinwen Fu, Riccardo Bettati
145
Voted
AMAST
2004
Springer
15 years 10 months ago
On Guard: Producing Run-Time Checks from Integrity Constraints
Abstract. Software applications are inevitably concerned with data integrity, whether the data is stored in a database, files, or program memory. An integrity guard is code execut...
Michael Benedikt, Glenn Bruns