Sciweavers

53302 search results - page 10454 / 10661
» On the design of a
Sort
View
136
Voted
CN
2004
256views more  CN 2004»
15 years 18 days ago
A line in the sand: a wireless sensor network for target detection, classification, and tracking
Intrusion detection is a surveillance problem of practical import that is well suited to wireless sensor networks. In this paper, we study the application of sensor networks to the...
Anish Arora, Prabal Dutta, Sandip Bapat, Vinod Kul...
94
Voted
CN
2004
142views more  CN 2004»
15 years 18 days ago
Adaptive video streaming: pre-encoded MPEG-4 with bandwidth scaling
The increasing popularity of streaming video is a cause for concern for the stability of the Internet because most streaming video content is currently delivered via UDP, without ...
Alex Balk, Mario Gerla, Dario Maggiorini, M. Y. Sa...
113
Voted
CN
2004
103views more  CN 2004»
15 years 18 days ago
Modeling IP traffic: joint characterization of packet arrivals and packet sizes using BMAPs
This paper proposes a traffic model and a parameter fitting procedure that are capable of achieving accurate prediction of the queuing behavior for IP traffic exhibiting long-rang...
Paulo Salvador, António Pacheco, Rui Valada...
102
Voted
CN
2004
122views more  CN 2004»
15 years 18 days ago
Group rekeying with limited unicast recovery
In secure group communications, a key server can deliver a "grouporiented" rekey message [22] to a large number of users efficiently using multicast. For reliable delive...
X. Brian Zhang, Simon S. Lam, Dong-Young Lee
104
Voted
COGSCI
2004
81views more  COGSCI 2004»
15 years 18 days ago
Soft constraints in interactive behavior: the case of ignoring perfect knowledge in-the-world for imperfect knowledge in-the-hea
Constraints and dependencies among the elements of embodied cognition form patterns or microstrategies of interactive behavior. Hard constraints determine which microstrategies ar...
Wayne D. Gray, Wai-Tat Fu
« Prev « First page 10454 / 10661 Last » Next »