Sciweavers

1886 search results - page 324 / 378
» Verifying and validating a simulation model
Sort
View
ATAL
2006
Springer
15 years 1 months ago
Scalable and reliable data delivery in mobile ad hoc sensor networks
This paper studies scalable data delivery algorithms in mobile ad hoc sensor networks with node and link failures. Many algorithms have been developed for data delivery and fusion...
Bin Yu, Paul Scerri, Katia P. Sycara, Yang Xu, Mic...
3DIM
2003
IEEE
15 years 1 months ago
Efficient Surface Reconstruction from Range Curves
This paper proposes an approach for surface reconstruction of free-form rigid objects from an arbitrary set of intersecting range curves. A strategy for updating the reconstructed...
Dragan Tubic, Patrick Hébert, Denis Laurend...
CORR
2010
Springer
142views Education» more  CORR 2010»
14 years 9 months ago
The Accuracy of Tree-based Counting in Dynamic Networks
Tree-based protocols are ubiquitous in distributed systems. They are flexible, they perform generally well, and, in static conditions, their analysis is mostly simple. Under churn...
Supriya Krishnamurthy, John Ardelius, Erik Aurell,...
CORR
2006
Springer
114views Education» more  CORR 2006»
14 years 9 months ago
Peer to Peer Networks for Defense Against Internet Worms
Abstract-- Internet worms, which spread in computer networks without human mediation, pose a severe threat to computer systems today. The rate of propagation of worms has been meas...
Srinivas Shakkottai, R. Srikant
JPDC
2006
87views more  JPDC 2006»
14 years 9 months ago
Honeypot back-propagation for mitigating spoofing distributed Denial-of-Service attacks
Any packet destined to a honeypot machine (that is, a decoy server machine) is most probably an attack packet. We propose honeypot back-propagation, a scheme that traces attack pa...
Sherif M. Khattab, Rami G. Melhem, Daniel Moss&eac...