Sciweavers

2031 search results - page 393 / 407
» On Tree-Constrained Matchings and Generalizations
Sort
View
SENSYS
2006
ACM
14 years 3 months ago
StarDust: a flexible architecture for passive localization in wireless sensor networks
The problem of localization in wireless sensor networks where nodes do not use ranging hardware, remains a challenging problem, when considering the required location accuracy, en...
Radu Stoleru, Pascal Vicaire, Tian He, John A. Sta...
SIGCOMM
2006
ACM
14 years 3 months ago
Detecting evasion attacks at high speeds without reassembly
Ptacek and Newsham [14] showed how to evade signature detection at Intrusion Prevention Systems (IPS) using TCP and IP Fragmentation. These attacks are implemented in tools like F...
George Varghese, J. Andrew Fingerhut, Flavio Bonom...
SIGCSE
2006
ACM
362views Education» more  SIGCSE 2006»
14 years 3 months ago
Chirp on crickets: teaching compilers using an embedded robot controller
Traditionally, the topics of compiler construction and language processing have been taught as an elective course in Computer Science curricula. As such, students may graduate wit...
Li Xu, Fred G. Martin
SMA
2006
ACM
122views Solid Modeling» more  SMA 2006»
14 years 3 months ago
Segmenting reliefs on triangle meshes
Sculptural reliefs are widely used in various industries for purposes such as applying brands to packaging and decorating porcelain. In order to easily apply reliefs to CAD models...
Shenglan Liu, Ralph R. Martin, Frank C. Langbein, ...
AUIC
2005
IEEE
14 years 3 months ago
Aiding Text Entry of Foreign Alphabets with Visual Keyboard Plus
Computer keyboards are used to input hundreds of different languages using many different alphabets. Despite this diversity, the physical layout of keyboards is fairly uniform, ...
L. Rennie, Andy Cockburn