Sciweavers

5882 search results - page 1079 / 1177
» networks 2010
Sort
View
ICASSP
2010
IEEE
14 years 6 months ago
Performance of shockwave-based shooter localization under model misspecification
This paper considers the estimation of shooter locations using a sensor network where each sensor measures the time difference between receptions of a firearm's muzzle blast ...
Joshua N. Ash, Gene T. Whipps, Richard J. Kozick
IFIP
2010
Springer
14 years 6 months ago
Semantics of Trust
This paper formalizes the semantics of trust and studies the transitivity of trust. On the Web, people and software agents have to interact with "strangers". This makes ...
Tim Muller
IFIP
2010
Springer
14 years 6 months ago
Are BGP Routers Open to Attack? An Experiment
Abstract. The BGP protocol is at the core of the routing infrastructure of the Internet. Across years, BGP has proved to be very stable for its purpose. However, there have been so...
Ludovico Cavedon, Christopher Kruegel, Giovanni Vi...
IWOCA
2010
Springer
232views Algorithms» more  IWOCA 2010»
14 years 6 months ago
Computing Role Assignments of Proper Interval Graphs in Polynomial Time
A homomorphism from a graph G to a graph R is locally surjective if its restriction to the neighborhood of each vertex of G is surjective. Such a homomorphism is also called an R-r...
Pinar Heggernes, Pim van 't Hof, Daniël Paulu...
PE
2010
Springer
135views Optimization» more  PE 2010»
14 years 6 months ago
Performance evaluation of component-based software systems: A survey
Performance prediction and measurement approaches for component-based software systems help software architects to evaluate their systems based on component performance specificat...
Heiko Koziolek
« Prev « First page 1079 / 1177 Last » Next »