Sciweavers

10995 search results - page 2180 / 2199
» Positioning
Sort
View
ICDE
2011
IEEE
235views Database» more  ICDE 2011»
13 years 24 days ago
Dealing proactively with data corruption: Challenges and opportunities
—The danger of production or backup data becoming corrupted is a problem that database administrators dread. This position paper aims to bring this problem to the attention of th...
Nedyalko Borisov, Shivnath Babu, NagaPramod Mandag...
INFOCOM
2011
IEEE
13 years 24 days ago
An analytical approach to real-time misbehavior detection in IEEE 802.11 based wireless networks
—The distributed nature of the CSMA/CA based wireless protocols, e.g., the IEEE 802.11 distributed coordinated function (DCF), allows malicious nodes to deliberately manipulate t...
Jin Tang, Yu Cheng, Weihua Zhuang
TKDE
2011
266views more  TKDE 2011»
13 years 25 days ago
Continuous Monitoring of Distance Based Range Queries
Given a positive value r, a distance based range query returns the objects that lie within the distance r of the query location. In this paper, we focus on the distance based rang...
Muhammad Aamir Cheema, Ljiljana Brankovic, Xuemin ...
PERCOM
2011
ACM
13 years 24 days ago
PoX: Protecting users from malicious Facebook applications
Abstract—Online social networks such as Facebook, MySpace, and Orkut store large amounts of sensitive user data. While a user can legitimately assume that a social network provid...
Manuel Egele, Andreas Moser, Christopher Kruegel, ...
VR
2011
IEEE
309views Virtual Reality» more  VR 2011»
13 years 23 days ago
Two-handed tangible interaction techniques for composing augmented blocks
Abstract Modeling tools typically have their own interaction methods for combining virtual objects. For realistic composition in 3D space, many researchers from the fields of virt...
Hyeongmook Lee, Mark Billinghurst, Woontack Woo
« Prev « First page 2180 / 2199 Last » Next »