Sciweavers

755 search results - page 38 / 151
» ideas 2005
Sort
View
116
Voted
ICRA
2005
IEEE
118views Robotics» more  ICRA 2005»
15 years 3 months ago
Planning with Continuous Actions in Partially Observable Environments
Abstract— We present a simple randomized POMDP algorithm for planning with continuous actions in partially observable environments. Our algorithm operates on a set of reachable b...
Matthijs T. J. Spaan, Nikos A. Vlassis
INFOCOM
2005
IEEE
15 years 3 months ago
Intentional dropping: a novel scheme for SYN flooding mitigation
— This paper presents a novel scheme to mitigate the effect of SYN flooding attacks. The scheme, called intentional dropping based filtering, is based on the observation of cl...
Basheer Al-Duwairi, G. Manimaran
77
Voted
INFOCOM
2005
IEEE
15 years 3 months ago
Relevance of massively distributed explorations of the Internet topology: simulation results
— Internet maps are generally constructed using the traceroute tool from a few sources to many destinations. It appeared recently that this exploration process gives a partial an...
Jean-Loup Guillaume, Matthieu Latapy
ISM
2005
IEEE
103views Multimedia» more  ISM 2005»
15 years 3 months ago
Supporting Low-Cost Video-on-Demand in Heterogeneous Peer-to-Peer Networks
We propose a novel low-cost video-on-demand architecture for heterogeneous peer-to-peer networks. The key idea of this architecture is to aggregate peers’ storage and bandwidths...
Xin Liu, Son T. Vuong
ITCC
2005
IEEE
15 years 3 months ago
Conversion and Proxy Functions for Symmetric Key Ciphers
As a general design criterion, a symmetric key cipher should not be closed under functional composition due to the implications on the security of the cipher. However, there are s...
Debra L. Cook, Angelos D. Keromytis