Sciweavers

8021 search results - page 1528 / 1605
» A Type System for Tom
Sort
View
TRIDENTCOM
2006
IEEE
14 years 3 months ago
Emulation versus simulation: A case study of TCP-targeted denial of service attacks
—In this paper, we investigate the applicability of simulation and emulation for denial of service (DoS) attack experimentation. As a case study, we consider low-rate TCP-targete...
Roman Chertov, Sonia Fahmy, Ness B. Shroff
ACMDIS
2006
ACM
14 years 3 months ago
Morphome: a constructive field study of proactive information technology in the home
This paper presents the main results of a three-year long field and design study of proactive information technology in the home. This technology uses sensors to track human activ...
Ilpo Koskinen, Kristo Kuusela, Katja Battarbee, An...
CASES
2006
ACM
14 years 3 months ago
Limitations of special-purpose instructions for similarity measurements in media SIMD extensions
Microprocessor vendors have provided special-purpose instructions such as psadbw and pdist to accelerate the sumof-absolute differences (SAD) similarity measurement. The usefulne...
Asadollah Shahbahrami, Ben H. H. Juurlink, Stamati...
ELPUB
2006
ACM
14 years 3 months ago
Electronic Publishing at Humboldt University Berlin - Concepts, Tools and Services
Originally established to merely publish electronic theses and dissertations (ETDs) as well as postdoctoral theses, the edoc server at Humboldt University Berlin (http://edoc.hu-b...
Uwe Müller, Manuel Klatt, Susanne Dobratz, Sv...
ETRA
2006
ACM
114views Biometrics» more  ETRA 2006»
14 years 3 months ago
Visual attention in 3D video games
Understanding players’ visual attention patterns within an interactive 3D game environment is an important research area that can improve game level design and graphics. Several...
Su Yan, Magy Seif El-Nasr
« Prev « First page 1528 / 1605 Last » Next »