Sciweavers

3717 search results - page 602 / 744
» Representing Multiple Theories
Sort
View
SP
2005
IEEE
156views Security Privacy» more  SP 2005»
15 years 9 months ago
Distributed Detection of Node Replication Attacks in Sensor Networks
The low-cost, off-the-shelf hardware components in unshielded sensor-network nodes leave them vulnerable to compromise. With little effort, an adversary may capture nodes, analyze...
Bryan Parno, Adrian Perrig, Virgil D. Gligor
IMC
2005
ACM
15 years 9 months ago
Measurements, Analysis, and Modeling of BitTorrent-like Systems
Existing studies on BitTorrent systems are single-torrent based, while more than 85% of all peers participate in multiple torrents according to our trace analysis. In addition, th...
Lei Guo, Songqing Chen, Zhen Xiao, Enhua Tan, Xiao...
FM
2005
Springer
156views Formal Methods» more  FM 2005»
15 years 9 months ago
Testing Concurrent Object-Oriented Systems with Spec Explorer
Abstract Colin Campbell, Wolfgang Grieskamp, Lev Nachmanson, Wolfram Schulte, Nikolai Tillmann, and Margus Veanes Microsoft Research, Redmond, WA, USA Abstract. We describe a pract...
Colin Campbell, Wolfgang Grieskamp, Lev Nachmanson...
CIVR
2010
Springer
199views Image Analysis» more  CIVR 2010»
15 years 9 months ago
Unsupervised multi-feature tag relevance learning for social image retrieval
Interpreting the relevance of a user-contributed tag with respect to the visual content of an image is an emerging problem in social image retrieval. In the literature this proble...
Xirong Li, Cees G. M. Snoek, Marcel Worring
PODC
1999
ACM
15 years 8 months ago
Dynamically Configurable Distributed Objects
The dynamically configurable distributed object (DCDO) model helps enable object evolution and facilitate the development of distributed objects from multiple independent implemen...
Michael J. Lewis, Andrew S. Grimshaw