Sciweavers

661 search results - page 49 / 133
» Robustness Guarantees for Anonymity
Sort
View
111
Voted
IWCMC
2006
ACM
15 years 6 months ago
On the robustness of grid-based deployment in wireless sensor networks
Grid-based sensor deployment is an effective and efficient practice for provisioning wireless sensor networks. Previous work has addressed grid-based deployment of sensors in orde...
Kenan Xu, Glen Takahara, Hossam S. Hassanein
ESA
2005
Springer
114views Algorithms» more  ESA 2005»
15 years 6 months ago
Making Chord Robust to Byzantine Attacks
Chord is a distributed hash table (DHT) that requires only O(logn) links per node and performs searches with latency and message cost O(logn), where n is the number of peers in the...
Amos Fiat, Jared Saia, Maxwell Young
120
Voted
DAS
2008
Springer
15 years 2 months ago
Handling of Surface Modifications for Robust Image Based Mail Piece Comparison
Image based mail piece identification is a new technology for optimizing the postal sorting process. Exploiting the mail piece surface uniqueness, characteristic features are used...
Katja Worm, Beate Meffert
110
Voted
AR
2006
94views more  AR 2006»
15 years 24 days ago
Stability analysis and robust composite controller synthesis for flexible joint robots
In this paper the control of exible joint manipulators is studied in detail. The model of N{axis exible joint manipulators are derived and reformulated in the form of singular per...
H. D. Taghirad, M. A. Khosravi
100
Voted
JPDC
2008
122views more  JPDC 2008»
15 years 21 days ago
Stochastic robustness metric and its use for static resource allocations
This research investigates the problem of robust static resource allocation for distributed computing systems operating under imposed Quality of Service (QoS) constraints. Often, ...
Vladimir Shestak, Jay Smith, Anthony A. Maciejewsk...