Sciweavers

1464 search results - page 287 / 293
» Process-Oriented Collective Operations
Sort
View
TPDS
2008
78views more  TPDS 2008»
13 years 7 months ago
Tracing Worm Break-In and Contaminations via Process Coloring: A Provenance-Preserving Approach
To detect and investigate self-propagating worm attacks against networked servers, the following capabilities are desirable: (1) raising timely alerts to trigger a worm investigat...
Xuxian Jiang, Florian P. Buchholz, Aaron Walters, ...
ADHOC
2004
134views more  ADHOC 2004»
13 years 7 months ago
Scalable team multicast in wireless ad hoc networks exploiting coordinated motion
In this paper, we study a new multicast paradigm for large scale mobile ad hoc networks, namely team multicast. In team multicast the multicast group does not consist of individua...
Yunjung Yi, Mario Gerla, Katia Obraczka
TWC
2008
154views more  TWC 2008»
13 years 7 months ago
TUA: A Novel Compromise-Resilient Authentication Architecture for Wireless Mesh Networks
User authentication is essential in service-oriented communication networks to identify and reject any unauthorized network access. The state-of-the-art practice in securing wirele...
Xiaodong Lin, Rongxing Lu, Pin-Han Ho, Xuemin Shen...
UMUAI
2008
192views more  UMUAI 2008»
13 years 7 months ago
Automatic detection of learner's affect from conversational cues
We explored the reliability of detecting a learner's affect from conversational features extracted from interactions with AutoTutor, an intelligent tutoring system that helps...
Sidney K. D'Mello, Scotty D. Craig, Amy M. Withers...
COGSCI
2004
81views more  COGSCI 2004»
13 years 7 months ago
Soft constraints in interactive behavior: the case of ignoring perfect knowledge in-the-world for imperfect knowledge in-the-hea
Constraints and dependencies among the elements of embodied cognition form patterns or microstrategies of interactive behavior. Hard constraints determine which microstrategies ar...
Wayne D. Gray, Wai-Tat Fu