Sciweavers

1737 search results - page 95 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
DEXAW
2008
IEEE
183views Database» more  DEXAW 2008»
15 years 6 months ago
Audio-Visual Content Analysis in P2P Networks: The SAPIR Approach
Content based search in audio-visual collections requires media specific analysis for extracting low level features to be efficiently indexed and searched. We present the SAPIR ...
Walter Allasia, Fabrizio Falchi, Francesco Gallo, ...
AGENTS
2000
Springer
15 years 4 months ago
Experiments in Building Experiential Trust in a Society of Objective-Trust Based Agents
In this paper we develop a notion of “objective trust” for Software Agents, that is trust of, or between, Agents based on actual experiences between those Agents. Experiential ...
Mark Witkowski, Alexander Artikis, Jeremy Pitt
MSWIM
2005
ACM
15 years 5 months ago
Experimental comparisons between SAODV and AODV routing protocols
There have been various secure routing protocols proposed for mobile ad hoc networks. Most of these protocols are analyzed by two standard techniques: simulation and security anal...
Yuxia Lin, Amir Hamed Mohsenian Rad, Vincent W. S....
AMDO
2006
Springer
15 years 3 months ago
Efficient Incorporation of Motionless Foreground Objects for Adaptive Background Segmentation
In this paper, we want to exploit the knowledge obtained from those detected objects which are incorporated into the background model since they cease their movement. These motionl...
Ivan Huerta Casado, Daniel Rowe, Jordi Gonzà...
IEEEARES
2008
IEEE
15 years 6 months ago
RTQG: Real-Time Quorum-based Gossip Protocol for Unreliable Networks
We consider scheduling real-time tasks in the presence of message loss and Byzantine node failures in unreliable networks. We present scheduling algorithms called RTQG and RTQG-B....
Bo Zhang, Kai Han, Binoy Ravindran, E. Douglas Jen...