Sciweavers

347 search results - page 57 / 70
» Proactive Computing
Sort
View
IEEESP
2010
99views more  IEEESP 2010»
13 years 8 months ago
The Iterated Weakest Link
Abstract. We devise a model for security investment that reflects dynamic interaction between a defender, who faces uncertainty, and an attacker, who repeatedly targets the weakes...
Rainer Böhme, Tyler Moore
TMC
2010
109views more  TMC 2010»
13 years 8 months ago
Uncertainty Modeling and Reduction in MANETs
—Evaluating and quantifying trust stimulates collaboration in mobile ad hoc networks (MANETs). Many existing reputation systems sharply divide the trust value into right or wrong...
Feng Li, Jie Wu
ISBI
2011
IEEE
13 years 1 months ago
Skull-stripping with deformable organisms
Segmenting brain from non-brain tissue within magnetic resonance (MR) images of the human head, also known as skull-stripping, is a critical processing step in the analysis of neu...
Gautam Prasad, Anand A. Joshi, Paul M. Thompson, A...
CACM
2005
126views more  CACM 2005»
13 years 9 months ago
Extrovert gadgets
This paper presents a set of architectures for the composition of ubiquitous computing applications. It describes research that is being carried out in "extrovert-Gadgets&quo...
Achilles Kameas, Irene Mavrommati
SIGUCCS
2006
ACM
14 years 3 months ago
Bridging the student support gap
In recent years, the use of a computer has become a requirement for success in a collegiate environment, and the demand for mobile computing has sharply increased. In response to ...
Gerald Bailey, Jamie Piperberg, Bud Hiller