Sciweavers

3898 search results - page 699 / 780
» Maintaining Component-Based Systems
Sort
View
128
Voted
NOSSDAV
2009
Springer
15 years 10 months ago
Overlay monitoring and repair in swarm-based peer-to-peer streaming
In Swarm-based Peer-to-Peer Streaming (SPS) mechanisms, participating peers form a randomly connected mesh over which they incorporate swarm-like content delivery. In practice, a ...
Nazanin Magharei, Reza Rejaie
117
Voted
SSS
2009
Springer
195views Control Systems» more  SSS 2009»
15 years 10 months ago
Anonymous Transactions in Computer Networks
Abstract. We present schemes for providing anonymous transactions while privacy and anonymity are preserved, providing user anonymous authentication in distributed networks such as...
Shlomi Dolev, Marina Kopeetsky
138
Voted
IMC
2009
ACM
15 years 10 months ago
ANTIDOTE: understanding and defending against poisoning of anomaly detectors
Statistical machine learning techniques have recently garnered increased popularity as a means to improve network design and security. For intrusion detection, such methods build ...
Benjamin I. P. Rubinstein, Blaine Nelson, Ling Hua...
SIGMETRICS
2009
ACM
182views Hardware» more  SIGMETRICS 2009»
15 years 10 months ago
The age of gossip: spatial mean field regime
Disseminating a piece of information, or updates for a piece of information, has been shown to benefit greatly from simple randomized procedures, sometimes referred to as gossipi...
Augustin Chaintreau, Jean-Yves Le Boudec, Nikodin ...
141
Voted
ICRA
2008
IEEE
160views Robotics» more  ICRA 2008»
15 years 10 months ago
A constrained optimization approach to virtual fixtures for multi-handed tasks
— In this work, we have extended the concept of constrained motion control of robots to surgical tasks that require multiple robots. We present virtual fixtures to guide the mot...
Ankur Kapoor, Russell H. Taylor