Sciweavers

2468 search results - page 429 / 494
» On Model Checking Techniques for Randomized Distributed Syst...
Sort
View
111
Voted
ACSAC
2004
IEEE
15 years 7 months ago
Using Predators to Combat Worms and Viruses: A Simulation-Based Study
Large-scale attacks generated by fast-spreading or stealthy malicious mobile code, such as flash worms and e-mail viruses, demand new approaches to patch management and disinfecti...
Ajay K. Gupta 0002, Daniel C. DuVarney
JUCS
2007
90views more  JUCS 2007»
15 years 3 months ago
High-level Structured Interactive Programs with Registers and Voices
Abstract: A model (consisting of rv-systems), a core programming language (for developing rv-programs), several specification and analysis techniques appropriate for modeling, pro...
Alexandru Popa, Alexandru Sofronia, Gheorghe Stefa...
163
Voted
CVPR
2009
IEEE
16 years 10 months ago
Memory-based particle filter for face pose tracking robust under complex dynamics
A novel particle filter, the Memory-based Particle Filter (M-PF), is proposed that can visually track moving objects that have complex dynamics. We aim to realize robustness aga...
Dan Mikami (NTT), Kazuhiro Otsuka (NTT), Junji YAM...
ICSNW
2004
Springer
188views Database» more  ICSNW 2004»
15 years 8 months ago
Peer Selection in Peer-to-Peer Networks with Semantic Topologies
Peer-to-Peer systems have proven to be an effective way of sharing data. Modern protocols are able to efficiently route a message to a given peer. However, determining the destin...
Peter Haase, Ronny Siebes, Frank van Harmelen
147
Voted
INFOCOM
2005
IEEE
15 years 9 months ago
BARD: Bayesian-assisted resource discovery in sensor networks
Data dissemination in sensor networks requires four components: resource discovery, route establishment, packet forwarding, and route maintenance. Resource discovery can be the mos...
Fred Stann, John S. Heidemann