Sciweavers

10995 search results - page 2159 / 2199
» Positioning
Sort
View
ISW
2010
Springer
13 years 7 months ago
Artificial Malware Immunization Based on Dynamically Assigned Sense of Self
Computer malwares (e.g., botnets, rootkits, spware) are one of the most serious threats to all computers and networks. Most malwares conduct their malicious actions via hijacking t...
Xinyuan Wang, Xuxian Jiang
SENSYS
2010
ACM
13 years 7 months ago
The Jigsaw continuous sensing engine for mobile phone applications
Supporting continuous sensing applications on mobile phones is challenging because of the resource demands of long-term sensing, inference and communication algorithms. We present...
Hong Lu, Jun Yang, Zhigang Liu, Nicholas D. Lane, ...
USS
2010
13 years 7 months ago
Toward Automated Detection of Logic Vulnerabilities in Web Applications
Web applications are the most common way to make services and data available on the Internet. Unfortunately, with the increase in the number and complexity of these applications, ...
Viktoria Felmetsger, Ludovico Cavedon, Christopher...
VTC
2010
IEEE
135views Communications» more  VTC 2010»
13 years 7 months ago
Biconnecting a Network of Mobile Robots Using Virtual Angular Forces
This paper proposes a new solution to the problem of self-deploying a network of wireless mobile robots with simultaneous consideration to several criteria, that are, the fault-tol...
Arnaud Casteigts, Jeremie Albert, Serge Chaumette,...
WAOA
2010
Springer
246views Algorithms» more  WAOA 2010»
13 years 7 months ago
Tradeoff between Energy and Throughput for Online Deadline Scheduling
The past few years have witnessed a number of interesting online algorithms for deadline scheduling in the dynamic speed scaling model (in which a processor can vary its speed to ...
Ho-Leung Chan, Tak Wah Lam, Rongbin Li
« Prev « First page 2159 / 2199 Last » Next »