Sciweavers

10633 search results - page 1768 / 2127
» Relating Distributed Objects
Sort
View
QEST
2008
IEEE
15 years 9 months ago
KPC-Toolbox: Simple Yet Effective Trace Fitting Using Markovian Arrival Processes
We present the KPC-Toolbox, a collection of Matlab scripts for fitting workload traces into Markovian Arrival Processes (MAPs) in an automatic way. We first present detailed sen...
Giuliano Casale, Eddy Z. Zhang, Evgenia Smirni
WACV
2008
IEEE
15 years 9 months ago
Robust Human Pose Recognition Using Unlabelled Markers
In this paper, we tackle robust human pose recognition using unlabelled markers obtained from an optical marker-based motion capture system. A coarse-to-fine fast pose matching al...
Yi Wang, Gang Qian
WCNC
2008
IEEE
15 years 9 months ago
On Spatial Reuse and Capture in Ad Hoc Networks
—Neighbors of both the transmitter and the receiver must keep quiet in a 802.11 wireless network as it requires bidirectional exchange, i.e., nodes reverse their roles as transmi...
Naveen Santhapuri, Srihari Nelakuditi, Romit Roy C...
WCNC
2008
IEEE
15 years 9 months ago
Interference in a Cognitive Network with Beacon
—We study a cognitive network consisting of multiple cognitive users communicating in the presence of a single primary user. The primary user is located at the center of the netw...
Mai Vu, Saeed S. Ghassemzadeh, Vahid Tarokh
110
Voted
ACNS
2008
Springer
88views Cryptology» more  ACNS 2008»
15 years 9 months ago
On the Effectiveness of Internal Patching Against File-Sharing Worms
File-sharing worms have been terrorizing Peer-to-peer (P2P) systems in recent years. Existing defenses relying on users’ individual recoveries or limiting users’ file-sharing ...
Liang Xie, Hui Song, Sencun Zhu
« Prev « First page 1768 / 2127 Last » Next »