Sciweavers

13383 search results - page 2332 / 2677
» Abstractions from proofs
Sort
View
INFOCOM
2009
IEEE
15 years 11 months ago
A Social Network Based Patching Scheme for Worm Containment in Cellular Networks
Abstract—Recently, cellular phone networks have begun allowing third-party applications to run over certain open-API phone operating systems such as Windows Mobile, Iphone and Go...
Zhichao Zhu, Guohong Cao, Sencun Zhu, Supranamaya ...
INFOCOM
2009
IEEE
15 years 11 months ago
Distilling Superior Peers in Large-Scale P2P Streaming Systems
Abstract—In large-scale peer-to-peer (P2P) live streaming systems with a limited supply of server bandwidth, increasing the amount of upload bandwidth supplied by peers becomes c...
Zimu Liu, Chuan Wu, Baochun Li, Shuqiao Zhao
IROS
2009
IEEE
137views Robotics» more  IROS 2009»
15 years 11 months ago
A framework for planning comfortable and customizable motion of an assistive mobile robot
Abstract— Assistive mobile robots that can navigate autonomously can greatly benefit people with mobility impairments. Since an assistive mobile robot transports a human user fr...
Shilpa Gulati, Chetan Jhurani, Benjamin Kuipers, R...
ASIACRYPT
2009
Springer
15 years 11 months ago
Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions
Abstract. Physical attacks on cryptographic implementations and devices have become crucial. In this context a recent line of research on a new class of side-channel attacks, calle...
Frederik Armknecht, Roel Maes, Ahmad-Reza Sadeghi,...
BPM
2009
Springer
195views Business» more  BPM 2009»
15 years 11 months ago
Process Mining: Fuzzy Clustering and Performance Visualization
The goal of performance analysis of business processes is to gain insights into operational processes, for the purpose of optimizing them. To intuitively show which parts of the pr...
Boudewijn F. van Dongen, A. Adriansyah
« Prev « First page 2332 / 2677 Last » Next »