Sciweavers

8881 search results - page 1560 / 1777
» Active Data Clustering
Sort
View
RTAS
2008
IEEE
15 years 11 months ago
Optimizing the Implementation of Communication in Synchronous Reactive Models
A fundamental asset of a model-based development process is the capability of providing an automatic implementation of the model that preserves its semantics and, at the same time...
Marco Di Natale, Guoqiang Wang, Alberto L. Sangiov...
SADFE
2008
IEEE
15 years 11 months ago
Finding the Evidence in Tamper-Evident Logs
Secure logs are powerful tools for building systems that must resist forgery, prove temporal relationships, and stand up to forensic scrutiny. The proofs of order and integrity en...
Daniel Sandler, Kyle Derr, Scott A. Crosby, Dan S....
WCNC
2008
IEEE
15 years 11 months ago
Multi-Carrier Burst Contention (MCBC): Scalable Medium Access Control for Wireless Networks
—With the rapid growth of WLAN capability for mobile devices such as laptops, handhelds, mobile phones and vehicles, we will witness WLANs with very large numbers of active nodes...
Bogdan Roman, Frank Stajano, Ian J. Wassell, David...
ACSAC
2007
IEEE
15 years 11 months ago
Countering False Accusations and Collusion in the Detection of In-Band Wormholes
Cooperative intrusion detection techniques for MANETs utilize ordinary computing hosts as network intrusion sensors. If compromised, these hosts may inject bogus data into the int...
Daniel Sterne, Geoffrey Lawler, Richard Gopaul, Br...
AVSS
2007
IEEE
15 years 11 months ago
On the effect of motion segmentation techniques in description based adaptive video transmission
This paper presents the results of analysing the effect of different motion segmentation techniques in a system that transmits the information captured by a static surveillance ca...
Juan Carlos San Miguel, José María M...
« Prev « First page 1560 / 1777 Last » Next »