Sciweavers

1886 search results - page 174 / 378
» Verifying and Validating Simulation Models
Sort
View
110
Voted
ICDCS
1999
IEEE
15 years 7 months ago
On Providing Quality-of-Service Control for Core-Based Multicast Routing
In this paper, we develop e cient admission control tests for member join leave and its associated state refresh and update procedures for receiver-initiated core-based multicast ...
Hung-Ying Tyan, Chao-Ju Hou, Bin Wang 0002
WSCG
2004
158views more  WSCG 2004»
15 years 4 months ago
Fully Automatic Elastic Registration of MR Images with Statistical Feature Extraction
We present a fully automatic scheme for the registration of MR images. The registration is carried out as a combination of an affine and an elastic transformation. The affine part...
Martin Held, Werner Weiser, Franz Wilhelmstöt...
125
Voted
AUTOMATICA
2006
103views more  AUTOMATICA 2006»
15 years 2 months ago
A universal iterative learning stabilizer for a class of MIMO systems
Design of iterative learning control (ILC) often requires some prior knowledge about a system's control matrix. In some applications, such as uncalibrated visual servoing, th...
Ping Jiang, Huadong Chen, Leon C. A. Bamforth
111
Voted
TMC
2010
138views more  TMC 2010»
15 years 1 months ago
Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes
—Compromised-node and denial-of-service are two key attacks in wireless sensor networks (WSNs). In this paper, we study routing mechanisms that circumvent (bypass) black holes fo...
Tao Shu, Marwan Krunz, Sisi Liu
137
Voted
IJNSEC
2011
232views more  IJNSEC 2011»
14 years 9 months ago
Location-aware, Trust-based Detection and Isolation of Compromised Nodes in Wireless Sensor Networks
The detection and isolation of compromised nodes in wireless sensor networks is a difficult task. However, failure to identify and isolate compromised nodes results in significan...
Garth V. Crosby, Lance Hester, Niki Pissinou