Sciweavers

3497 search results - page 584 / 700
» Making Distributed Applications Robust
Sort
View
130
Voted
MOBIWAC
2006
ACM
15 years 8 months ago
Evaluation of multi-radio extensions to AODV for wireless mesh networks
Due to their self-configuring and self-healing capabilities, as well as their low equipment and deployment cost, Wireless Mesh Networks (WMNs) based on commodity hardware present...
Asad Amir Pirzada, Marius Portmann, Jadwiga Induls...
121
Voted
INFOCOM
2005
IEEE
15 years 8 months ago
Design and implementation of network puzzles
Abstract— Client puzzles have been proposed in a number of protocols as a mechanism for mitigating the effects of distributed denial of service (DDoS) attacks. In order to provid...
Wu-chi Feng, Edward C. Kaiser, A. Luu
112
Voted
MIR
2005
ACM
176views Multimedia» more  MIR 2005»
15 years 8 months ago
Hybrid visual and conceptual image representation within active relevance feedback context
Many of the available image databases have keyword annotations associated with the images. In spite of the availability of good quality low-level visual features that reflect wel...
Marin Ferecatu, Nozha Boujemaa, Michel Crucianu
120
Voted
ATAL
2005
Springer
15 years 8 months ago
Experiences with the design and implementation of an agent-based autonomous UAV controller
This paper reports experiences and outcomes of designing and developing an agent–based, autonomous mission control system for an unmanned aerial vehicle (UAV). Most UAVs are not...
Samin Karim, Clinton Heinze
195
Voted
PLDI
2003
ACM
15 years 7 months ago
Checking and inferring local non-aliasing
In prior work [15] we studied a language construct restrict that allows programmers to specify that certain pointers are not aliased to other pointers used within a lexical scope....
Alexander Aiken, Jeffrey S. Foster, John Kodumal, ...