Sciweavers

1972 search results - page 196 / 395
» Testing Mobile and Distributed Systems: Method and Experimen...
Sort
View
WORM
2004
15 years 6 months ago
Toward understanding distributed blackhole placement
The monitoring of unused Internet address space has been shown to be an effective method for characterizing Internet threats including Internet worms and DDOS attacks. Because the...
Evan Cooke, Michael Bailey, Zhuoqing Morley Mao, D...
TIP
2010
170views more  TIP 2010»
14 years 11 months ago
Tracking and Activity Recognition Through Consensus in Distributed Camera Networks
Camera networks are being deployed for various applications like security and surveillance, disaster response and environmental modeling. However, there is little automated process...
Bi Song, Ahmed T. Kamal, Cristian Soto, Chong Ding...
AAAI
2008
15 years 7 months ago
Resource Constrained Distributed Constraint Optimization with Virtual Variables
Cooperative problem solving with resource constraints are important in practical multi-agent systems. Resource constraints are necessary to handle practical problems including dis...
Toshihiro Matsui, Hiroshi Matsuo, Marius Silaghi, ...
TCBB
2008
137views more  TCBB 2008»
15 years 5 months ago
Toward Verified Biological Models
The last several decades have witnessed a vast accumulation of biological data and data analysis. Many of these data sets represent only a small fraction of the system's behav...
Avital Sadot, Jasmin Fisher, Dan Barak, Yishai Adm...
137
Voted
ISCAS
2008
IEEE
179views Hardware» more  ISCAS 2008»
15 years 11 months ago
Direction of arrival estimation for speech sources using fourth order cross cumulants
— In many applications where speech separation and enhancement is of interest, e.g. conferencing systems, mobile phones and hearing aids, accurate speaker localization is importa...
Mikael Swarding, Benny Sallberg, Nedelko Grbic