Sciweavers

2211 search results - page 252 / 443
» Robustness of Model-Based Simulations
Sort
View
GLOBECOM
2006
IEEE
15 years 10 months ago
Wormhole Attack in Wireless Ad Hoc Networks: Analysis and Countermeasure
— The wormhole attack is one of the most severe security attacks in wireless ad hoc networks. In this paper, we analyze the effect of the wormhole attack in shortest path routing...
Majid Khabbazian, Hugues Mercier, Vijay K. Bhargav...
GLOBECOM
2006
IEEE
15 years 10 months ago
A New MAC Protocol for Wireless Packet Networks
— Medium access control (MAC) protocols for wireless packet networks usually need to be distributed for flexibility and robustness. In a distributed way, however, collision dete...
Jun Peng, Liang Cheng, Biplab Sikdar
ICARCV
2006
IEEE
164views Robotics» more  ICARCV 2006»
15 years 10 months ago
Fast Object Extraction from Bayesian Occupancy Grids using Self Organizing Networks
— Despite their popularity, occupancy grids cannot be directly applied to problems where the identity of the objects populating an environment needs to be taken into account (eg ...
Dizan Vasquez, Fabrizio Romanelli, Thierry Fraicha...
159
Voted
ICMCS
2006
IEEE
178views Multimedia» more  ICMCS 2006»
15 years 10 months ago
Spatially Adaptive Wavelet Thresholding for Image Watermarking
In this paper, we introduce a new robust image watermarking technique based on the Discrete Wavelet Transform (DWT). The proposed method extends the concept of image denoising to ...
Mahmood Al-khassaweneh, Selin Aviyente
ICMCS
2006
IEEE
135views Multimedia» more  ICMCS 2006»
15 years 10 months ago
Degree Pre-Reserved Hierarchical Tree for Multimedia Multicast
Overlay multicast tree is widely used to support large-scale real-time multimedia applications. The scalability and the robustness are two key issues in the overlay structure desi...
Nan Zhang, Yuanchun Shi, Bin Chang