Sciweavers

1663 search results - page 229 / 333
» Computer Security in the Real World
Sort
View
MSWIM
2006
ACM
15 years 10 months ago
The effect of the radio wave propagation model in mobile ad hoc networks
The simulation of wireless networks has been an important tool for researchers and the industry in the last years. Especially in the field of Mobile Ad Hoc Networking, most curre...
Arne Schmitz, Martin Wenig
NORDICHI
2006
ACM
15 years 10 months ago
Designing familiar open surfaces
While participatory design makes end-users part of the design process, we might also want the resulting system to be open for interpretation, appropriation and change over time to...
Kristina Höök
CRV
2005
IEEE
219views Robotics» more  CRV 2005»
15 years 9 months ago
People Tracking using Robust Motion Detection and Estimation
Real world computer vision systems highly depend on reliable, robust retrieval of motion cues to make accurate decisions about their surroundings. In this paper, we present a simp...
Markus Latzel, Emilie Darcourt, John K. Tsotsos
DSN
2005
IEEE
15 years 9 months ago
Design Time Reliability Analysis of Distributed Fault Tolerance Algorithms
Designing a distributed fault tolerance algorithm requires careful analysis of both fault models and diagnosis strategies. A system will fail if there are too many active faults, ...
Elizabeth Latronico, Philip Koopman
ICDM
2005
IEEE
149views Data Mining» more  ICDM 2005»
15 years 9 months ago
A Join-Less Approach for Co-Location Pattern Mining: A Summary of Results
Spatial co-location patterns represent the subsets of features whose instances are frequently located together in geographic space. Co-location pattern discovery presents challeng...
Jin Soung Yoo, Shashi Shekhar, Mete Celik