Sciweavers

1663 search results - page 284 / 333
» Computer Security in the Real World
Sort
View
136
Voted
MOBIHOC
2008
ACM
16 years 3 months ago
Improving sensor network immunity under worm attacks: a software diversity approach
Because of cost and resource constraints, sensor nodes do not have a complicated hardware architecture or operating system to protect program safety. Hence, the notorious buffer-o...
Yi Yang, Sencun Zhu, Guohong Cao
153
Voted
BIRTHDAY
2003
Springer
15 years 9 months ago
Spatial Data Management for Virtual Product Development
Abstract: In the automotive and aerospace industry, millions of technical documents are generated during the development of complex engineering products. Particularly, the universa...
Hans-Peter Kriegel, Martin Pfeifle, Marco Pöt...
128
Voted
ESAW
2000
Springer
15 years 7 months ago
Engineering Social Order
Social Order becomes a major problem in MAS and in computer mediated human interaction. After explaining the notions of Social Order and Social Control, I claim that there are mult...
Cristiano Castelfranchi
131
Voted
CVPR
2000
IEEE
16 years 5 months ago
Variable Albedo Surface Reconstruction from Stereo and Shape from Shading
We presen t a multiview method for the computation of object shape and re ectance characteristics based on the integration of shape from shading (SFS) and stereo, for nonconstan t...
Dimitris Samaras, Dimitris N. Metaxas, Pascal Fua,...
126
Voted
CHI
2005
ACM
16 years 4 months ago
Distributed display environments
Augmented reality makes it possible to visualize information directly within the context of the real world by overlaying virtual graphics. We use the term view management to refer...
Dugald Ralph Hutchings, John T. Stasko, Mary Czerw...