Sciweavers

1109 search results - page 178 / 222
» Towards an analysis of dynamic environments
Sort
View
97
Voted
ASUNAM
2010
IEEE
14 years 1 months ago
A Study on Social Network Metrics and Their Application in Trust Networks
Social network analysis has recently gained a lot of interest because of the advent and the increasing popularity of social media, such as blogs, social networks, microblogging, o...
Iraklis Varlamis, Magdalini Eirinaki, Malamati D. ...
ICSE
2007
IEEE-ACM
15 years 10 months ago
Stakeholder Value Driven Threat Modeling for Off the Shelf Based Systems
er abstract summarizes the Threat Modeling method based on Attacking Path Analysis (T-MAP) which quantifies and prioritizes security threats by calculating the total severity weig...
Yue Chen
ICIAR
2007
Springer
15 years 4 months ago
Real-Time Vehicle Ego-Motion Using Stereo Pairs and Particle Filters
This paper presents a direct and stochastic technique for real time estimation of on board camera position and orientation—the ego-motion problem. An on board stereo vision syste...
Fadi Dornaika, Angel Domingo Sappa
90
Voted
IEEEARES
2006
IEEE
15 years 4 months ago
Replication Strategies for Reliable Decentralised Storage
Distributed hash tables (DHTs) can be used as the basis of a resilient lookup service in unstable environments: local routing tables are updated to reflected changes in the netwo...
Matthew Leslie, Jim Davies, Todd Huffman
PDP
2006
IEEE
15 years 4 months ago
A Distributed Approach to Construction of Topology Mismatching Aware P2P Overlays in Wireless Ad Hoc Networks
Peer-to-Peer computing is mainly based on the virtual overlay network constructed in the application layer. Often, there is topology mismatching between the overlay network and th...
Yu Huang 0002, Beihong Jin, Jiannong Cao