Sciweavers

2945 search results - page 536 / 589
» Designing and Implementing Malicious Hardware
Sort
View
TVCG
1998
121views more  TVCG 1998»
15 years 3 months ago
Interactive Volume Navigation
—Volume navigation is the interactive exploration of volume data sets by “flying” the viewpoint through the data, producing a volume rendered view at each frame. We present a...
Martin L. Brady, Kenneth K. Jung, H. T. Nguyen, Th...
TON
2002
138views more  TON 2002»
15 years 3 months ago
Single-packet IP traceback
The design of the IP protocol makes it difficult to reliably identify the originator of an IP packet. Even in the absence of any deliberate attempt to disguise a packet's orig...
Alex C. Snoeren, Craig Partridge, Luis A. Sanchez,...
TVCG
2010
118views more  TVCG 2010»
15 years 2 months ago
A Curved Ray Camera for Handling Occlusions through Continuous Multiperspective Visualization
—Most images used in visualization are computed with the planar pinhole camera. This classic camera model has important advantages such as simplicity, which enables efficient sof...
Jian Cui, Paul Rosen, Voicu Popescu, Christoph M. ...
GLOBECOM
2010
IEEE
15 years 2 months ago
Feasibility and Benefits of Passive RFID Wake-Up Radios for Wireless Sensor Networks
Energy efficiency is one of the crucial design criteria for wireless sensor networks. Idle listening constitutes a major part of energy waste, and thus solutions such as duty cycli...
He Ba, Ilker Demirkol, Wendi Rabiner Heinzelman
NSDI
2010
15 years 2 months ago
AccuRate: Constellation Based Rate Estimation in Wireless Networks
This paper proposes to exploit physical layer information towards improved rate selection in wireless networks. While existing schemes pick good transmission rates, this paper tak...
Souvik Sen, Naveen Santhapuri, Romit Roy Choudhury...