Sciweavers

987 search results - page 77 / 198
» Key Characteristics of Hymns
Sort
View
ACSAC
2006
IEEE
14 years 1 months ago
Bluetooth Worms: Models, Dynamics, and Defense Implications
Recent occurrences of mobile worms like Cabir, Mabir and CommWarrior have created growing concerns over the security of data stored on mobile devices such as cell phones and PDAs....
Guanhua Yan, Stephan Eidenbenz
BROADNETS
2006
IEEE
14 years 1 months ago
Securing Sensor Networks Using A Novel Multi-Channel Architecture
— In many applications of sensor networks, security is a very important issue. To be resistant against the various attacks, nodes in a sensor network can establish pairwise secre...
Chao Gui, Ashima Gupta, Prasant Mohapatra
DATE
2006
IEEE
107views Hardware» more  DATE 2006»
14 years 1 months ago
Flexible specification and application of rule-based transformations in an automotive design flow
This paper addresses an XML-based design environment, which provides a powerful basis for the manipulation of hardware design descriptions. The contribution of the paper is a flex...
Jan-Hendrik Oetjens, Joachim Gerlach, Wolfgang Ros...
FGR
2006
IEEE
117views Biometrics» more  FGR 2006»
14 years 1 months ago
Gesture Spotting in Low-Quality Video with Features Based on Curvature Scale Space
Player’s gesture and action spotting in sports video is a key task in automatic analysis of the video material at a high level. In many sports views, the camera covers a large p...
Myung-Cheol Roh, William J. Christmas, Josef Kittl...
HICSS
2006
IEEE
123views Biometrics» more  HICSS 2006»
14 years 1 months ago
Systems Design, Process Performance and Economic Outcomes
IT value remains a serious concern of management today, especially how it should be measured and how it is created. Although we have made significant progress at the firm and aggre...
Prabu Davamanirajan, Robert J. Kauffman, Charles H...