Sciweavers

1663 search results - page 169 / 333
» Computer Security in the Real World
Sort
View
KDD
2004
ACM
148views Data Mining» more  KDD 2004»
16 years 4 months ago
Fast discovery of connection subgraphs
We define a connection subgraph as a small subgraph of a large graph that best captures the relationship between two nodes. The primary motivation for this work is to provide a pa...
Christos Faloutsos, Kevin S. McCurley, Andrew Tomk...
112
Voted
PERCOM
2006
ACM
16 years 3 months ago
RFID malware: Design principles and examples
This paper explores the concept of malware for Radio Frequency Identification (RFID) systems -- including RFID exploits, RFID worms, and RFID viruses. We present RFID malware desi...
Melanie R. Rieback, Patrick N. D. Simpson, Bruno C...
TEI
2009
ACM
92views Hardware» more  TEI 2009»
15 years 10 months ago
TinkerSheets: using paper forms to control and visualize tangible simulations
This paper describes TinkerSheets, a paper-based interface to tangible simulations. The proposed interface combines the advantages of form-based input and paper. Form-based input ...
Guillaume Zufferey, Patrick Jermann, Auréli...
CEC
2009
IEEE
15 years 10 months ago
Recombining angles in Differential Evolution
Abstract— In this paper we wish to investigate how optimization problems involving angles can best be handled when using Differential Evolution (DE) as the optimization technique...
Thomas Greve Kristensen
168
Voted
CRV
2009
IEEE
225views Robotics» more  CRV 2009»
15 years 10 months ago
3D Modeling from Multiple Views with Integrated Registration and Data Fusion
This paper presents an integrated modeling system capable of generating coloured three dimensional representations of a scene observed from multiple viewpoints. Emphasis is given ...
Alain Boyer, Phillip Curtis, Pierre Payeur