Sciweavers

557 search results - page 76 / 112
» Two experiences designing for effective security
Sort
View
ICNP
2005
IEEE
15 years 5 months ago
Can coexisting overlays inadvertently step on each other?
By allowing end hosts to make routing decisions at the application level, different overlay networks may unintentionally interfere with each other. This paper describes how multip...
Ram Keralapura, Chen-Nee Chuah, Nina Taft, Gianluc...
DSN
2000
IEEE
15 years 4 months ago
A Low Latency, Loss Tolerant Architecture and Protocol for Wide Area Group Communication
Group communication systems are proven tools upon which to build fault-tolerant systems. As the demands for fault-tolerance increase and more applications require reliable distrib...
Yair Amir, Claudiu Danilov, Jonathan Robert Stanto...
BCSHCI
2009
15 years 1 months ago
Low-fi skin vision: a case study in rapid prototyping a sensory substitution system
We describe the design process we have used to develop a minimal, twenty vibration motor Tactile Vision Sensory Substitution (TVSS) system which enables blind-folded subjects to s...
Jon Bird, Paul Marshall, Yvonne Rogers
GLOBECOM
2008
IEEE
15 years 22 hour ago
Traffic-Aware Inter-Domain Routing for Improved Internet Routing Stability
This paper develops and studies a traffic-aware inter-domain routing (TIDR) protocol, which drastically improves the stability of the BGP-based inter-domain routing system. TIDR is...
Peng Chen, Woon Hyung Cho, Zhenhai Duan, Xin Yuan
GPEM
2000
121views more  GPEM 2000»
14 years 11 months ago
Bayesian Methods for Efficient Genetic Programming
ct. A Bayesian framework for genetic programming GP is presented. This is motivated by the observation that genetic programming iteratively searches populations of fitter programs ...
Byoung-Tak Zhang