Sciweavers

1663 search results - page 278 / 333
» Computer Security in the Real World
Sort
View
135
Voted
HPDC
1996
IEEE
15 years 8 months ago
Legion - A View from 50, 000 Feet
' The coming of giga-bit networks makes possible the realization ofa single nationwide virtual computer comprised of a variety of geographically distributed highpe6ormance mac...
Andrew S. Grimshaw, William A. Wulf
CVPR
2008
IEEE
16 years 5 months ago
Motion estimation for multi-camera systems using global optimization
We present a motion estimation algorithm for multicamera systems consisting of more than one calibrated camera securely attached on a moving object. So, they move all together, bu...
Hongdong Li, Jae-Hak Kim, Richard I. Hartley
160
Voted
DCOSS
2010
Springer
15 years 7 months ago
Wormholes No More? Localized Wormhole Detection and Prevention in Wireless Networks
A number of protocols have been proposed to date to defend against wormhole attacks in wireless networks by adopting synchronized clocks, positioning devices, or directional antenn...
Tassos Dimitriou, Thanassis Giannetsos
126
Voted
TEI
2010
ACM
128views Hardware» more  TEI 2010»
15 years 10 months ago
Texturing the "material turn" in interaction design
Advances in the creation of computational materials are transforming our thinking about relations between the physical and digital. In this paper we characterize this transformati...
Erica Robles, Mikael Wiberg
MC
2007
149views Computer Science» more  MC 2007»
15 years 5 months ago
Embodied Media and Mixed Reality for Social and Physical Interactive Communication and Entertainment
This talk outlines new facilities within human media spaces supporting embodied interaction between humans, animals, and computation both socially and physically, with the aim of ...
Adrian David Cheok