Sciweavers

264 search results - page 24 / 53
» Making Argumentation More Believable
Sort
View
PERCOM
2004
ACM
14 years 7 months ago
Denial-of-Service Attacks on Battery-powered Mobile Computers
Sleep deprivation attacks are a form of denial of service attack whereby an attacker renders a pervasive computing device inoperable by draining the battery more quickly than it w...
Thomas L. Martin, Michael S. Hsiao, Dong S. Ha, Ja...
ICPP
2007
IEEE
14 years 1 months ago
Defending P2Ps from Overlay Flooding-based DDoS
A flooding-based search mechanism is often used in unstructured P2P systems. Although a flooding-based search mechanism is simple and easy to implement, it is vulnerable to overla...
Yunhao Liu, Xiaomei Liu, Chen Wang, Li Xiao
ICRA
2007
IEEE
129views Robotics» more  ICRA 2007»
14 years 1 months ago
Scene Matching between a Map and a Hand Drawn Sketch Using Spatial Relations
—The goal of this work is to determine the object correspondence between a sketched map and the scene depicted by the sketch, e.g., as represented by an occupancy grid map (OGM) ...
Gaurav Parekh, Marjorie Skubic, Ozy Sjahputera, Ja...
GI
2004
Springer
14 years 28 days ago
Saliency Extraction for Gaze-Contingent Displays
: Organic Computing is beginning to provide computer systems with organic and biological properties. We believe these systems will benefit from user interfaces that integrate the ...
Martin Böhme, Christopher Krause, Thomas Mart...
HICSS
2003
IEEE
164views Biometrics» more  HICSS 2003»
14 years 25 days ago
From Computer Networks to Agent Networks
From the 1990s on, one of the most important challenges facing computer science researchers has been the design and construction of software tools to exploit Internet computing. A...
Guoqiang Zhong, Kenichi Takahashi, Satoshi Amamiya...