Sciweavers

14824 search results - page 2554 / 2965
» Security - Introduction
Sort
View
ICNP
2006
IEEE
15 years 10 months ago
Pretty Good BGP: Improving BGP by Cautiously Adopting Routes
— The Internet’s interdomain routing protocol, BGP, is vulnerable to a number of damaging attacks, which often arise from operator misconfiguration. Proposed solutions with st...
Josh Karlin, Stephanie Forrest, Jennifer Rexford
ICPP
2006
IEEE
15 years 10 months ago
hiREP: Hierarchical Reputation Management for Peer-to-Peer Systems
The open feature of peer-to-peer systems invites the spread of the malfunctioning data. Additional reputation systems are constructed to guarantee the data authenticity. One chall...
Xiaomei Liu, Li Xiao
ICRA
2006
IEEE
61views Robotics» more  ICRA 2006»
15 years 10 months ago
Simulated Odor Tracking in a Plane Normal to the Wind Direction
— A new strategy is developed for tracking an odor plume in an environment where wind is present. The strategy is inspired by the mechanisms that animals use to orient to stimuli...
Adam J. Rutkowski, Mark A. Willis, Roger D. Quinn
ICRA
2006
IEEE
256views Robotics» more  ICRA 2006»
15 years 10 months ago
An Ankle-foot Emulation System for the Study of Human Walking Biomechanics
– Although below-knee prostheses have been commercially available for some time, today’s devices are completely passive, and consequently, their mechanical properties remain fi...
Samuel K. Au, Peter Dilworth, Hugh M. Herr
ICSEA
2006
IEEE
15 years 10 months ago
Enforcing Interaction Properties in AOSD-Enabled Systems
The construction and maintenance of large and complex software systems depend on the existence of global principles describing the structure and the interaction among its various ...
Constantin Serban, Shmuel S. Tyszberowicz
« Prev « First page 2554 / 2965 Last » Next »