Sciweavers

1230 search results - page 67 / 246
» On Abstraction in Scenarios
Sort
View
ADHOCNOW
2006
Springer
14 years 4 months ago
Circularity-Based Medium Access Control in Mobile Ad Hoc Networks
Abstract. The RTS/CTS access scheme, designed to reduce the number of collisions in a IEEE 802.11 network, is known to exhibit problems due to masked nodes, the imbalance between t...
Mohammad Z. Ahmad, Damla Turgut, R. Bhakthavathsal...
COMPSAC
2005
IEEE
14 years 3 months ago
Detecting Intrusions Specified in a Software Specification Language
To protect software against malicious activities, organizations are required to monitor security breaches. Intrusion Detection Systems (IDS) are those kinds of monitoring tools th...
Mohammad Feroz Raihan, Mohammad Zulkernine
ICCV
2005
IEEE
14 years 3 months ago
A Joint System for Person Tracking and Face Detection
Abstract. Visual detection and tracking of humans in complex scenes is a challenging problem with a wide range of applications, for example surveillance and human-computer interact...
ZhenQiu Zhang, Gerasimos Potamianos, Andrew W. Sen...
KNINVI
2005
Springer
14 years 3 months ago
Digital Concept Maps for Managing Knowledge and Information
Abstract. Due to the increasing amount and complexity of knowledge and information in many domains, students who self-regulate their study in e-learning scenarios often suffer from...
Sigmar-Olaf Tergan
TCC
2005
Springer
163views Cryptology» more  TCC 2005»
14 years 3 months ago
Adaptive Security of Symbolic Encryption
Abstract. We prove a computational soundness theorem for the symbolic analysis of cryptographic protocols which extends an analogous theorem of Abadi and Rogaway (J. of Cryptology ...
Daniele Micciancio, Saurabh Panjwani