Sciweavers

657 search results - page 122 / 132
» Assessment of E-Business Transformation Using Simulation Mod...
Sort
View
GLOBECOM
2008
IEEE
14 years 1 months ago
Wavelet Based Detection of Session Hijacking Attacks in Wireless Networks
— This paper develops a mechanism for detecting session hijacking attacks in wireless networks. The proposed scheme is based on detecting abrupt changes in the strength of the re...
Xiaobo Long, Biplab Sikdar
ICRA
2008
IEEE
134views Robotics» more  ICRA 2008»
14 years 1 months ago
Real-time learning of resolved velocity control on a Mitsubishi PA-10
Abstract— Learning inverse kinematics has long been fascinating the robot learning community. While humans acquire this transformation to complicated tool spaces with ease, it is...
Jan Peters, Duy Nguyen-Tuong
PIMRC
2008
IEEE
14 years 1 months ago
Base-station and subcarrier assignment in two-cell OFDMA downlink under QoS fairness
Abstract— Consider the problem of base-station and subcarrier assignment on the downlink of a two-cell OFDMA system with adaptive modulation. The aim is to maximize a common data...
Ayman Alsawah, Inbar Fijalkow
IWDW
2005
Springer
14 years 27 days ago
Watermarking of 3D Irregular Meshes Based on Wavelet Multiresolution Analysis
In this paper, we propose a robust watermarking method for 3-D triangle surface meshes. Most previous methods based on the wavelet analysis can process only semi-regular meshes. Ou...
Min-Su Kim, Sébastien Valette, Ho-Youl Jung...
ICDT
1990
ACM
110views Database» more  ICDT 1990»
13 years 11 months ago
Beginnings of a Theory of General Database Completions
Ordinary logical implication is not enough for answering queries in a logic database, since especially negative information is only implicitly represented in the database state. M...
Stefan Brass