Sciweavers

661 search results - page 80 / 133
» Robustness Guarantees for Anonymity
Sort
View
99
Voted
VTC
2008
IEEE
15 years 7 months ago
Optimizing Adaptive Transmission Policies for Wireless Vehicular Communications
—The adoption of wireless vehicular communication technologies would strongly depend on the technologies transmission reliability, required by QoS demanding traffic safety applic...
Miguel Sepulcre, Javier Gozálvez
FGCN
2007
IEEE
119views Communications» more  FGCN 2007»
15 years 7 months ago
A Novel Adaptive Load Shedding Scheme for Data Stream Processing
In this paper, we present a novel feedback control-based load shedding scheme for data stream processing. Firstly we apply system identification to establish a dynamic model to de...
Yunyi Zhang, Chongzheng Huang, Deyun Zhang
IEEEARES
2007
IEEE
15 years 7 months ago
Secure, Resilient Computing Clusters: Self-Cleansing Intrusion Tolerance with Hardware Enforced Security (SCIT/HES)
The formidable difficulty in securing systems stems in large part from the increasing complexity of the systems we build but also the degree to which we now depend on information ...
David Arsenault, Arun Sood, Yih Huang
73
Voted
IROS
2007
IEEE
87views Robotics» more  IROS 2007»
15 years 7 months ago
Vision-based loop closing for delayed state robot mapping
— This paper shows results on outdoor vision-based loop closing for Simultaneous Localization and Mapping. Our experiments show that for loops of over 50m, the pose estimates mai...
Viorela Ila, Juan Andrade-Cetto, Rafael Valencia, ...
EUC
2007
Springer
15 years 7 months ago
HGLAP - Hierarchical Group-Index Based Lightweight Authentication Protocol for Distributed RFID System
This paper presents a low-cost and secure authentication protocol to reduce the computational load on both the back-end database and the tags in a distributed RFID system. The prop...
JaeCheol Ha, Hwankoo Kim, JeaHoon Park, Sang-Jae M...