Sciweavers

16160 search results - page 3122 / 3232
» How to approach humans
Sort
View
LCN
2006
IEEE
14 years 2 months ago
Analysis of Exponential Backoff with Multipacket Reception in Wireless Networks
A collision resolution scheme is essential to the performance of a random-access wireless network. Most schemes employ exponential backoff (EB) to adjust the transmission attempt ...
Peng Xuan Zheng, Ying Jun Zhang, Soung Chang Liew
NOMS
2006
IEEE
189views Communications» more  NOMS 2006»
14 years 2 months ago
Analysis of Firewall Policy Rules Using Data Mining Techniques
— Firewall is the de facto core technology of today's network security and defense. However, the management of firewall rules has been proven to be complex, error-prone, cos...
Korosh Golnabi, Richard K. Min, Latifur Khan, Ehab...
SP
2006
IEEE
214views Security Privacy» more  SP 2006»
14 years 2 months ago
Automatically Generating Malicious Disks using Symbolic Execution
Many current systems allow data produced by potentially malicious sources to be mounted as a file system. File system code must check this data for dangerous values or invariant ...
Junfeng Yang, Can Sar, Paul Twohey, Cristian Cadar...
ACCV
2006
Springer
14 years 2 months ago
Dense Motion and Disparity Estimation Via Loopy Belief Propagation
We describe a method for computing a dense estimate of motion and disparity, given a stereo video sequence containing moving non-rigid objects. In contrast to previous approaches, ...
Michael Isard, John MacCormick
ACISP
2006
Springer
14 years 2 months ago
Towards Provable Security for Ubiquitous Applications
Abstract. The emergence of computing environments where smart devices are embedded pervasively in the physical world has made possible many interesting applications and has trigger...
Mike Burmester, Tri Van Le, Breno de Medeiros
« Prev « First page 3122 / 3232 Last » Next »