Sciweavers

214 search results - page 39 / 43
» Digital Secure-Communication Using Robust Hyper-Chaotic Syst...
Sort
View
ATAL
2007
Springer
14 years 1 months ago
Conditional random fields for activity recognition
Activity recognition is a key component for creating intelligent, multi-agent systems. Intrinsically, activity recognition is a temporal classification problem. In this paper, we...
Douglas L. Vail, Manuela M. Veloso, John D. Laffer...
MOBICOM
2006
ACM
14 years 1 months ago
Long-distance 802.11b links: performance measurements and experience
The use of 802.11 long-distance links is a cost-effective means of providing wireless connectivity to rural areas. Although deployments in this setting are increasing, a systemat...
Kameswari Chebrolu, Bhaskaran Raman, Sayandeep Sen
MOBICOM
2005
ACM
14 years 1 months ago
Self-management in chaotic wireless deployments
Over the past few years, wireless networking technologies have made vast forays into our daily lives. Today, one can find 802.11 hardware and other personal wireless technology e...
Aditya Akella, Glenn Judd, Srinivasan Seshan, Pete...
CCS
2009
ACM
13 years 11 months ago
Filter-resistant code injection on ARM
Code injections attacks are one of the most powerful and important classes of attacks on software. In such attacks, the attacker sends malicious input to a software application, w...
Yves Younan, Pieter Philippaerts, Frank Piessens, ...
TOG
2008
122views more  TOG 2008»
13 years 7 months ago
Time-resolved 3d capture of non-stationary gas flows
Fluid simulation is one of the most active research areas in computer graphics. However, it remains difficult to obtain measurements of real fluid flows for validation of the simu...
Bradley Atcheson, Ivo Ihrke, Wolfgang Heidrich, Ar...