Sciweavers

4636 search results - page 899 / 928
» Modelling and Validation with VipTool
Sort
View
SP
2005
IEEE
105views Security Privacy» more  SP 2005»
14 years 1 months ago
Detection of Denial-of-Message Attacks on Sensor Network Broadcasts
So far, sensor network broadcast protocols assume a trustworthy environment. However, in safety and missioncritical sensor networks this assumption may not be valid and some senso...
Jonathan M. McCune, Elaine Shi, Adrian Perrig, Mic...
VISUALIZATION
2005
IEEE
14 years 1 months ago
Visualizing intersecting surfaces with nested-surface techniques
This paper describes the adaptation and evaluation of existing nestedsurface visualization techniques for the problem of displaying intersecting surfaces. For this work, we collab...
Chris Weigle, Russell M. Taylor II
WISE
2005
Springer
14 years 1 months ago
A Web Recommendation Technique Based on Probabilistic Latent Semantic Analysis
Web transaction data between Web visitors and Web functionalities usually convey user task-oriented behavior pattern. Mining such type of clickstream data will lead to capture usag...
Guandong Xu, Yanchun Zhang, Xiaofang Zhou
MM
2005
ACM
107views Multimedia» more  MM 2005»
14 years 1 months ago
Spatio-temporal quality assessment for home videos
Compared with the video programs taken by professionals, home videos are always with low-quality content resulted from lack of professional capture skills. In this paper, we prese...
Tao Mei, Cai-Zhi Zhu, He-Qin Zhou, Xian-Sheng Hua
PLDI
2005
ACM
14 years 1 months ago
Checking type safety of foreign function calls
We present a multi-lingual type inference system for checking type safety across a foreign function interface. The goal of our system is to prevent foreign function calls from int...
Michael Furr, Jeffrey S. Foster