Sciweavers

7200 search results - page 1380 / 1440
» On the Computational Power of Winner-Take-All
Sort
View
VRST
2006
ACM
14 years 2 months ago
Hand-held virtual reality: a feasibility study
Hand-held computing devices are ubiquitous and have become part of our lives these days. Moreover, hand-held devices are also increasingly being equipped with special sensors and ...
Jane Hwang, Jaehoon Jung, Gerard Jounghyun Kim
ACSAC
2005
IEEE
14 years 2 months ago
Automated and Safe Vulnerability Assessment
As the number of system vulnerabilities multiplies in recent years, vulnerability assessment has emerged as a powerful system security administration tool that can identify vulner...
Fanglu Guo, Yang Yu, Tzi-cker Chiueh
AICCSA
2005
IEEE
168views Hardware» more  AICCSA 2005»
14 years 2 months ago
A dynamic range resource reservation protocol for QoS support in wireless networks
— Mobile ad hoc networks (MANETs) provide a powerful and dynamic platform to enable mobile computers to establish communications without an existing infrastructure. In order to p...
Imad Jawhar, Jie Wu
BROADNETS
2005
IEEE
14 years 2 months ago
Using location information for scheduling in 802.15.3 MAC
— In recent years, UWB has received much attention as a suitable Physical Layer (PHY) for Wireless Personal Area Networks (WPANS). UWB allows for low cost, low power, high bandwi...
Sethuram Balaji Kodeswaran, Anupam Joshi
CODES
2005
IEEE
14 years 2 months ago
Enhancing security through hardware-assisted run-time validation of program data properties
The growing number of information security breaches in electronic and computing systems calls for new design paradigms that consider security as a primary design objective. This i...
Divya Arora, Anand Raghunathan, Srivaths Ravi, Nir...
« Prev « First page 1380 / 1440 Last » Next »