Sciweavers

1663 search results - page 280 / 333
» Verification and validation of simulation models
Sort
View
ICDCSW
2007
IEEE
15 years 4 months ago
A Cooperative Approach for Analyzing Intrusions in Mobile Ad hoc Networks
In this paper, we consider the problem of reducing the number of false positives generated by cooperative Intrusion Detection Systems (IDSs) in Mobile Ad hoc Networks (MANETs). We...
Hadi Otrok, Mourad Debbabi, Chadi Assi, Prabir Bha...
INFOCOM
2007
IEEE
15 years 4 months ago
A Proxy View of Quality of Domain Name Service
— The Domain Name System (DNS) provides a critical service for the Internet – mapping of user-friendly domain names to their respective IP addresses. Yet, there is no standard ...
Lihua Yuan, Krishna Kant, Prasant Mohapatra, Chen-...
RTSS
2007
IEEE
15 years 4 months ago
Sea Depth Measurement with Restricted Floating Sensors
Sea depth monitoring is a critical task to ensure the safe operation of harbors. Traditional schemes largely rely on labor-intensive work and expensive hardware. This study explor...
Zheng Yang, Mo Li, Yunhao Liu
3DPVT
2006
IEEE
185views Visualization» more  3DPVT 2006»
15 years 3 months ago
A Probabilistic Method for Aligning and Merging Range Images with Anisotropic Error Distribution
This paper describes a probabilistic method of aligning and merging range images. We formulate these issues as problems of estimating the maximum likelihood. By examining the erro...
Ryusuke Sagawa, Nanaho Osawa, Yasushi Yagi
IROS
2006
IEEE
168views Robotics» more  IROS 2006»
15 years 3 months ago
Scanning the Environment with Two Independent Cameras - Biologically Motivated Approach
— In this paper we present a novel method for visual scanning and target tracking by means of independent pan-tilt cameras which mimic the chameleon visual system. We present a s...
Ofir Avni, Francesco Borrelli, Gadi Katzir, Ehud R...