Sciweavers

5718 search results - page 1141 / 1144
» Modeling Rule Precision
Sort
View
INFOCOM
2010
IEEE
13 years 5 months ago
Maximum Damage Malware Attack in Mobile Wireless Networks
—Malware attacks constitute a serious security risk that threatens to slow down the large scale proliferation of wireless applications. As a first step towards thwarting this se...
M. H. R. Khouzani, Saswati Sarkar, Eitan Altman
INTERNET
2010
170views more  INTERNET 2010»
13 years 5 months ago
Developing RESTful Web Services with Webmachine
bstractions and mechanisms Webmachine supplies to RESTful Web services developers. Not Your Typical Framework Web services frameworks typically fall into one of the following broad...
Justin Sheehy, Steve Vinoski
TSMC
2008
117views more  TSMC 2008»
13 years 5 months ago
Discovery of High-Level Behavior From Observation of Human Performance in a Strategic Game
This paper explores the issues faced in creating a sys-4 tem that can learn tactical human behavior merely by observing5 a human perform the behavior in a simulation. More specific...
Brian S. Stensrud, Avelino J. Gonzalez
TMC
2010
150views more  TMC 2010»
13 years 5 months ago
Handling Mobility in Wireless Sensor and Actor Networks
— In Wireless Sensor and Actor Networks (WSANs), the collaborative operation of sensors enables the distributed sensing of a physical phenomenon, while actors collect and process...
Tommaso Melodia, Dario Pompili, Ian F. Akyildiz
TVCG
2010
153views more  TVCG 2010»
13 years 5 months ago
Parallel View-Dependent Level-of-Detail Control
—We present a scheme for view-dependent level-of-detail control that is implemented entirely on programmable graphics hardware. Our scheme selectively refines and coarsens an ar...
Liang Hu, Pedro V. Sander, Hugues Hoppe
« Prev « First page 1141 / 1144 Last » Next »