Sciweavers

551 search results - page 75 / 111
» Preventing existence
Sort
View
IJHCR
2010
155views more  IJHCR 2010»
14 years 9 months ago
A Collaborative Replication Approach for Mobile-P2P Networks
This paper proposes CADRE (Collaborative Allocation and Deallocation of Replicas with Efficiency), which is a dynamic replication scheme for improving the typically low data avail...
Anirban Mondal, Sanjay Kumar Madria, Masaru Kitsur...
CSREASAM
2010
14 years 8 months ago
Modeling NIDS Evasion with Genetic Programming
Nowadays, Network Intrusion Detection Systems are quickly updated in order to prevent systems against new attacks. This situation has provoked that attackers focus their efforts on...
Sergio Pastrana, Agustín Orfila, Arturo Rib...
CORR
2011
Springer
171views Education» more  CORR 2011»
14 years 6 months ago
Persistent Robotic Tasks: Monitoring and Sweeping in Changing Environments
—We present controllers that enable mobile robots to persistently monitor or sweep a changing environment. The changing environment is modeled as a field which grows in location...
Stephen L. Smith, Mac Schwager, Daniela Rus
IHI
2010
141views Healthcare» more  IHI 2010»
14 years 6 months ago
Towards a definition of health informatics ethics
Information technology is a prominent tool in healthcare management. However, healthcare systems often fall short of addressing concerns about privacy, confidentiality and safety ...
Hamman W. Samuel, Osmar R. Zaïane, Dick Sobse...
ITIIS
2010
140views more  ITIIS 2010»
14 years 6 months ago
RGF: Receiver-based Greedy Forwarding for Energy Efficiency in Lossy Wireless Sensor Networks
Greedy forwarding is the key mechanism of geographic routing and is one of the protocols used most commonly in wireless sensor networks. Greedy forwarding uses 1-hop local informa...
In Hur, Moonseong Kim, Jaewan Seo, Hyunseung Choo