• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 262
Next 10 →

Mitigating routing misbehavior in mobile ad hoc networks

by Sergio Marti, T. J. Giuli, Kevin Lai, Mary Baker - Proc. ACM/IEEE MOBICOM , 2000
"... This paper describes two techniques that improve through-put in an ad hoc network in the presence of nodes that agree to forward packets but fail to do so. To mitigate this prob-lem, we propose categorizing nodes based upon their dynam-ically measured behavior. We use a watchdog that identifies misb ..."
Abstract - Cited by 1090 (4 self) - Add to MetaCart
This paper describes two techniques that improve through-put in an ad hoc network in the presence of nodes that agree to forward packets but fail to do so. To mitigate this prob-lem, we propose categorizing nodes based upon their dynam-ically measured behavior. We use a watchdog that identifies

Covering Indexes for Branching Path Queries

by Raghav Kaushik, Philip Bohannon, Jeffrey F Naughton, Henry F Korth , 2002
"... In this paper, we ask if the traditional relational query acceleration techniques of summary tables and covering indexes have analogs for branching path expression queries over tree- or graph-structured XML data. Our answer is yes-- the forward-and-backward index already proposed in the literature c ..."
Abstract - Cited by 127 (2 self) - Add to MetaCart
In this paper, we ask if the traditional relational query acceleration techniques of summary tables and covering indexes have analogs for branching path expression queries over tree- or graph-structured XML data. Our answer is yes-- the forward-and-backward index already proposed in the literature

Dynamic slicing long running programs through execution fast forwarding

by Xiangyu Zhang, Sriraman Tallam, Rajiv Gupta - In FSE , 2006
"... Fixing runtime bugs in long running programs using tracing based analyses such as dynamic slicing was believed to be prohibitively expensive. In this paper, we present a novel execution fast forward-ing technique that makes it feasible. While a naive solution is to divide the entire execution by che ..."
Abstract - Cited by 35 (9 self) - Add to MetaCart
Fixing runtime bugs in long running programs using tracing based analyses such as dynamic slicing was believed to be prohibitively expensive. In this paper, we present a novel execution fast forward-ing technique that makes it feasible. While a naive solution is to divide the entire execution

Reverse engineering of design patterns from Java source code

by Nija Shi, Ronald A. Olsson - 21st IEEE/ACM International Conference on Automated Software Engineering , 2006
"... Recovering design patterns can enhance existing source code analysis tools by bringing program understanding to the design level. This paper presents a new, fully automated pattern detection approach. The new approach is based on our reclassification of the GoF patterns by their pattern in-tent. We ..."
Abstract - Cited by 57 (2 self) - Add to MetaCart
argue that the GoF pattern catalog classifies de-sign patterns in the forward-engineering sense; our reclas-sification is better suited for reverse engineering. Our ap-proach uses lightweight static program analysis techniques to capture program intent. This paper also describes our tool, PINOT

Smart Forwarding Technique for Routing with Multiple QoS Constraints

by Aiguo Fei, Mario Gerla - In Proceedings of GLOBECOM'00 , 2000
"... Abstruct-QoS-constrained routing is considered as one of the key com-ponents to support quality of service in next-generation data networks. However, optimal routing problem subject to multiple constraints is NP-hard in general. In this paper we propose a technique called “smart for-warding ” which ..."
Abstract - Cited by 3 (1 self) - Add to MetaCart
-back routing protocols by only forward-ing routing request to a neighbor that is known to be able or potentially be able to meet the QoS requirement. We also describe how we can adjust routing overhead by bounding the number of flooding or crank-back trials with this technique. More detailed analysis

Reverse Engineering User Interfaces - A Technique

by Melody Moore
"... ing the Application Model In order to forward engineer to a GUI, the designer must understand the model of the application being reengineered from a user interface perspective. This includes identifying data entities and actions that are involved in the user interface, as well as relationships betw ..."
Abstract - Add to MetaCart
ing the Application Model In order to forward engineer to a GUI, the designer must understand the model of the application being reengineered from a user interface perspective. This includes identifying data entities and actions that are involved in the user interface, as well as relationships

Ultrasound imaging using variations of the iterative Born technique

by Lujiang Liu, Xiaodong Zhang, Shira L. Broschat, Senior Member - IEEE Trans. Ultrasonics, Ferroelectrics, and Freq. Control , 1999
"... Abstract—The iterative Born method is an inverse tech-nique that has been used successfully in ultrasound imag-ing. However, the calculation cost of the standard iterative Born method is high, and parallel computation is limited to the forward problem. In this work, two methods are in-troduced to in ..."
Abstract - Cited by 3 (2 self) - Add to MetaCart
Abstract—The iterative Born method is an inverse tech-nique that has been used successfully in ultrasound imag-ing. However, the calculation cost of the standard iterative Born method is high, and parallel computation is limited to the forward problem. In this work, two methods are in

Creating Vulnerability Signatures Using Weakest Pre-Conditions

by David Brumley, Hao Wang, Somesh Jha, Dawn Song - Proc. 20th IEEE Computer Security Foundations Symp. (CSF , 2007
"... Signature-based tools such as network intrusion detec-tion systems are widely used to protect critical systems. Au-tomatic signature generation techniques are needed to en-able these tools due to the speed at which new vulnera-bilities are discovered. In particular, we need automatic techniques whic ..."
Abstract - Cited by 49 (16 self) - Add to MetaCart
Signature-based tools such as network intrusion detec-tion systems are widely used to protect critical systems. Au-tomatic signature generation techniques are needed to en-able these tools due to the speed at which new vulnera-bilities are discovered. In particular, we need automatic techniques

A Novel Blending Technique for Two-Dimensional Forward-Looking Sonar Mosaicing

by Xevi Cufı ́, Joaquim Salvi
"... Abstract—High-resolution forward-looking sonars are becom-ing a tool of choice for exploring underwater environments under low visibility conditions. Their imagery can be mosaiced to obtain a global overview of submerged areas of interest and the spatial arrangement of different target features. How ..."
Abstract - Add to MetaCart
Abstract—High-resolution forward-looking sonars are becom-ing a tool of choice for exploring underwater environments under low visibility conditions. Their imagery can be mosaiced to obtain a global overview of submerged areas of interest and the spatial arrangement of different target features

APPLYING CONSTRAINT SATISFACTION TECHNIQUES TO AI PLANNING PROBLEMS

by Daniel Buettner, Daniel Buettner M. S, Advisor Berthe Choueiry , 2003
"... An AI planning problem is one in which an agent capable of perceiving certain states and of performing some actions finds itself in a world, needing to achieve certain goals. A solution to a planning problem is an ordered sequence of actions that, when carried out, will achieve the desired goals. Co ..."
Abstract - Add to MetaCart
of static variable orderings with forward check-ing. We also show the effectiveness of maintaining arc consistency (MAC) in solving AI planning problems so formulated. In addition, we present an improvement to the MAC algorithm that is not described in the CSP literature. The improvement to MAC uses
Next 10 →
Results 1 - 10 of 262
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University