Sciweavers

1351 search results - page 267 / 271
» A Possible Approach to the Development of Robotic Multi-Agen...
Sort
View
WS
2005
ACM
14 years 8 days ago
Hotspot-based traceback for mobile ad hoc networks
Traceback schemes are useful to identify the source of an attack. Existing traceback systems are not suitable for Mobile Ad Hoc Networks (MANET) because they rely on assumptions s...
Yi-an Huang, Wenke Lee
ACSAC
2001
IEEE
13 years 10 months ago
Verifiable Identifiers in Middleware Security
fies a number of issues related to security information r semantics on different layers of abstraction. In particular it is difficult to express caller and target accurately in the...
Ulrich Lang, Dieter Gollmann, Rudolf Schreiner
EDBT
2008
ACM
161views Database» more  EDBT 2008»
13 years 8 months ago
Automatic content targeting on mobile phones
The mobile phone industry has reached a saturation point. With low growth rates and fewer new customers available to acquire, competition among mobile operators is now focused on ...
Giovanni Giuffrida, Catarina Sismeiro, Giuseppe Tr...
SP
2008
IEEE
138views Security Privacy» more  SP 2008»
13 years 6 months ago
A performance tuning methodology with compiler support
We have developed an environment, based upon robust, existing, open source software, for tuning applications written using MPI, OpenMP or both. The goal of this effort, which inte...
Oscar Hernandez, Barbara M. Chapman, Haoqiang Jin
ICCV
2007
IEEE
14 years 8 months ago
Temporal Segmentation of Facial Behavior
Temporal segmentation of facial gestures in spontaneous facial behavior recorded in real-world settings is an important, unsolved, and relatively unexplored problem in facial imag...
Fernando De la Torre, Joan Campoy, Zara Ambadar, J...