Sciweavers

15792 search results - page 3030 / 3159
» Computational Abstraction Steps
Sort
View
MIDDLEWARE
2010
Springer
13 years 9 months ago
FaReCast: Fast, Reliable Application Layer Multicast for Flash Dissemination
Abstract. To disseminate messages from a single source to a large number of targeted receivers, a natural approach is the tree-based application layer multicast (ALM). However, in ...
Kyungbaek Kim, Sharad Mehrotra, Nalini Venkatasubr...
PERCOM
2010
ACM
13 years 9 months ago
Robopedia: Leveraging Sensorpedia for web-enabled robot control
Abstract— There is a growing interest in building Internetscale sensor networks that integrate sensors from around the world into a single unified system. In contrast, robotics ...
Richard Edwards, Lynne E. Parker, David Resseguie
PERVASIVE
2010
Springer
13 years 9 months ago
LOC8: A Location Model and Extensible Framework for Programming with Location
ing model abstracts over various types of positioning systems and incorporates the capture of uncertainty, serving as a foundation on which developers can apply sensor-fusion techn...
Graeme Stevenson, Juan Ye, Simon Dobson, Paddy Nix...
RAID
2010
Springer
13 years 9 months ago
An Analysis of Rogue AV Campaigns
Abstract. Rogue antivirus software has recently received extensive attention, justified by the diffusion and efficacy of its propagation. We present a longitudinal analysis of th...
Marco Cova, Corrado Leita, Olivier Thonnard, Angel...
RAID
2010
Springer
13 years 9 months ago
Detecting the Onset of Infection for Secure Hosts
Abstract. Software flaws in applications such as a browser may be exploited by attackers to launch drive-by-download (DBD), which has become the major vector of malware infection....
Kui Xu, Qiang Ma, Danfeng (Daphne) Yao
« Prev « First page 3030 / 3159 Last » Next »