Sciweavers

17471 search results - page 3402 / 3495
» Information Modeling
Sort
View
INFOCOM
2005
IEEE
14 years 3 months ago
A beacon-less location discovery scheme for wireless sensor networks
— In wireless sensor networks (WSNs), sensor location plays a critical role in many applications. Having a GPS receiver on every sensor node is costly. In the past, a number of l...
Lei Fang, Wenliang Du, Peng Ning
INFOCOM
2005
IEEE
14 years 3 months ago
Distributed algorithms for secure multipath routing
— To proactively defend against intruders from readily jeopardizing single-path data sessions, we propose a distributed secure multipath solution to route data across multiple pa...
Patrick P. C. Lee, Vishal Misra, Dan Rubenstein
ISWC
2005
IEEE
14 years 3 months ago
Pictorial Depth Cues for Outdoor Augmented Reality
This paper presents and evaluates a set of pictorial depth cues for far-field outdoor mobile augmented reality (AR). We examine the problem of accurately placing virtual annotatio...
Jason Wither, Tobias Höllerer
IWIA
2005
IEEE
14 years 3 months ago
Malware Defense Using Network Security Authentication
Malware defenses have primarily relied upon intrusion fingerprints to detect suspicious network behavior. While effective for discovering computers that are already compromised,...
Joseph V. Antrosio, Errin W. Fulp
KBSE
2005
IEEE
14 years 3 months ago
Determining the cost-quality trade-off for automated software traceability
Major software development standards mandate the establishment of trace links among software artifacts such as requirements, architectural elements, or source code without explici...
Alexander Egyed, Stefan Biffl, Matthias Heindl, Pa...
« Prev « First page 3402 / 3495 Last » Next »