Sciweavers

2927 search results - page 501 / 586
» Secure Distributed Human Computation
Sort
View
128
Voted
SASN
2006
ACM
15 years 8 months ago
Attacker traceback with cross-layer monitoring in wireless multi-hop networks
Denial-of-Service (DoS) and Distributed DoS (DDoS) attacks can cause serious problems in wireless networks due to its limited network/host resources. Attacker traceback is a promi...
Yongjin Kim, Ahmed Helmy
KDD
2009
ACM
173views Data Mining» more  KDD 2009»
15 years 7 months ago
Malware detection using statistical analysis of byte-level file content
Commercial anti-virus software are unable to provide protection against newly launched (a.k.a “zero-day”) malware. In this paper, we propose a novel malware detection techniqu...
S. Momina Tabish, M. Zubair Shafiq, Muddassar Faro...
136
Voted
WORDS
2003
IEEE
15 years 7 months ago
A Resource and QoS Management Framework for a Real-Time Event System in Mobile Ad Hoc Environments
A new class of applications can now be envisaged with the emergence of both mobile ad hoc computing and ubiquitous computing. Applications of such kind are characterised by being ...
Hector A. Duran-Limon, Gordon S. Blair, Adrian Fri...
SIGGRAPH
2010
ACM
15 years 7 months ago
Feature-based locomotion controllers
This paper introduces an approach to control of physics-based characters based on high-level features of movement, such as centerof-mass, angular momentum, and end-effectors. Obje...
Martin de Lasa, Igor Mordatch, Aaron Hertzmann
110
Voted
ASSETS
2005
ACM
15 years 4 months ago
Gestural text entry on multiple devices
We present various adaptations of the EdgeWrite unistroke text entry method that work on multiple computer input devices: styluses, touchpads, displacement and isometric joysticks...
Jacob O. Wobbrock, Brad A. Myers