Sciweavers

2436 search results - page 313 / 488
» Comonadic Notions of Computation
Sort
View
AINA
2005
IEEE
15 years 10 months ago
Designing Secure Wireless Mobile Ad Hoc Networks
In recent years, security in MANET is anticipated as the pre-establishment of specific information among the participating nodes, so that the future communications can be secured ...
Venkatesan Balakrishnan, Vijay Varadharajan
DSN
2005
IEEE
15 years 10 months ago
Defeating Memory Corruption Attacks via Pointer Taintedness Detection
Most malicious attacks compromise system security through memory corruption exploits. Recently proposed techniques attempt to defeat these attacks by protecting program control da...
Shuo Chen, Jun Xu, Nithin Nakka, Zbigniew Kalbarcz...
DSN
2005
IEEE
15 years 10 months ago
Neutralization of Errors and Attacks in Wireless Ad Hoc Networks
This paper proposes and evaluates strategies to build reliable and secure wireless ad hoc networks. Our contribution is based on the notion of inner-circle consistency, where loca...
Claudio Basile, Zbigniew Kalbarczyk, Ravishankar K...
ICCV
2005
IEEE
15 years 10 months ago
Progressive Surface Reconstruction from Images Using a Local Prior
This paper introduces a new method for surface reconstruction from multiple calibrated images. The primary contribution of this work is the notion of local prior to combine the ļ¬...
Gang Zeng, Sylvain Paris, Long Quan, Franço...
RTCSA
2005
IEEE
15 years 10 months ago
Fine-Grained Task Reweighting on Multiprocessors
We consider the problem of task reweighting in fair-scheduled multiprocessor systems wherein each task’s processor share is specified as a weight. When a task is reweighted, a ...
Aaron Block, James H. Anderson, Gary Bishop