Sciweavers

511 search results - page 20 / 103
» Organization Detection Using Emergent Computing
Sort
View
ISWC
1997
IEEE
13 years 12 months ago
Towards Situated Computing
Situated computing concerns the ability of computing devices to detect, interpret and respond to aspects of the user’s local environment. In this paper, we use our recent protot...
Richard Hull 0002, Philip Neaves, James Bedford-Ro...
DCOSS
2005
Springer
14 years 1 months ago
Stably Computable Properties of Network Graphs
We consider a scenario in which anonymous, finite-state sensing devices are deployed in an ad-hoc communication network of arbitrary size and unknown topology, and explore what p...
Dana Angluin, James Aspnes, Melody Chan, Michael J...
ECCV
2006
Springer
13 years 11 months ago
3-D Ultrasound Probe Calibration for Computer-Guided Diagnosis and Therapy
Abstract. With the emergence of swept-volume ultrasound (US) probes, precise and almost real-time US volume imaging has become available. This offers many new opportunities for com...
Michael Baumann, Vincent Daanen, Antoine Leroy, Jo...
CF
2005
ACM
13 years 9 months ago
SPANIDS: a scalable network intrusion detection loadbalancer
Network intrusion detection systems (NIDS) are becoming an increasingly important security measure. With rapidly increasing network speeds, the capacity of the NIDS sensor can lim...
Lambert Schaelicke, Kyle Wheeler, Curt Freeland
JNW
2008
83views more  JNW 2008»
13 years 7 months ago
Substantiating Timing and Behavioral Anomalies in Wireless LANs Using GCL
With the increasing dependence on wireless LANs (WLANs), businesses, educational institutions and other organizations are in need of a reliable security mechanism. The latest secur...
Elankayer Sithirasenan, Vallipuram Muthukkumarasam...