Sciweavers

1176 search results - page 175 / 236
» Exploiting Online Games
Sort
View
ICC
2007
IEEE
180views Communications» more  ICC 2007»
14 years 3 months ago
Distributed Quad-Tree for Spatial Querying in Wireless Sensor Networks
— In contrast to the traditional wireless sensor network (WSN) applications that perform only data collection and aggregation, new generation of information processing applicatio...
Murat Demirbas, Xuming Lu
VTC
2007
IEEE
105views Communications» more  VTC 2007»
14 years 3 months ago
Scheduling Algorithms For Policy Driven QoS Support in HSDPA Networks
— Increasing demand for high data-rate multimedia services has led to the emergence of high-speed data transfer features such as High-Speed Downlink Packet Access (HSDPA) for WCD...
Joseph S. Gomes, Mira Yun, Hyeong-Ah Choi, Jae-Hoo...
APSEC
2006
IEEE
14 years 2 months ago
Secrobat: Secure and Robust Component-based Architectures
Software systems, component-based systems (CBS) in particular, have a lot of vulnerabilities that may be exploited by intruders. Companies spend much time and money to “patch”...
Artem Vorobiev, Jun Han
CIG
2006
IEEE
14 years 2 months ago
Capturing The Information Conveyed By Opponents' Betting Behavior in Poker
— This paper develops an approach to the capture and measurement of the information contained in opponents’ bet actions in seven card stud poker. We develop a causal model link...
Eric Saund
ICMCS
2006
IEEE
237views Multimedia» more  ICMCS 2006»
14 years 2 months ago
Matching Faces with Textual Cues in Soccer Videos
In soccer videos, most significant actions are usually followed by close–up shots of players that take part in the action itself. Automatically annotating the identity of the p...
Marco Bertini, Alberto Del Bimbo, Walter Nunziati