Sciweavers

5267 search results - page 967 / 1054
» Methods for Knowledge Based Controlling of Distributed Syste...
Sort
View
COMSWARE
2006
IEEE
15 years 8 months ago
WLAN location sharing through a privacy observant architecture
Abstract— In the last few years, WLAN has seen immense growth and it will continue this trend due to the fact that it provides convenient connectivity as well as high speed links...
Kavitha Muthukrishnan, Nirvana Meratnia, Maria Eva...
RTAS
2006
IEEE
15 years 8 months ago
Impact of Upper Layer Adaptation on End-to-end Delay Management in Wireless Ad Hoc Networks
A good amount of research has been developed to support QoS issues in IEEE 802.11 ad hoc networks, such as QoS routing, MAC layer QoS support, and cross-layer QoS design. However,...
Wenbo He, Klara Nahrstedt
ACMSE
2006
ACM
15 years 8 months ago
Application layer intrusion detection for SQL injection
SQL injection attacks potentially affect all applications, especially web applications, that utilize a database backend. While these attacks are generally against the application...
Frank S. Rietta
UIST
2006
ACM
15 years 8 months ago
Using a low-cost electroencephalograph for task classification in HCI research
Modern brain sensing technologies provide a variety of methods for detecting specific forms of brain activity. In this paper, we present an initial step in exploring how these tec...
Johnny Chung Lee, Desney S. Tan
SAMOS
2004
Springer
15 years 7 months ago
A Novel Data-Path for Accelerating DSP Kernels
A high-performance data-path to implement DSP kernels is proposed in this paper. The data-path is based on a flexible, universal, and regular component to optimally exploiting both...
Michalis D. Galanis, George Theodoridis, Spyros Tr...