Sciweavers

12568 search results - page 2482 / 2514
» Selective user interaction
Sort
View
ICN
2009
Springer
14 years 17 days ago
New Algorithm for the Design of Topology Aware Hypercube in Multi-hop Ad Hoc Networks
Securing group communications in resource constrained, infrastructure-less environments such as Mobile Ad Hoc Networks (MANETs) has become one of the most challenging research dire...
Maria Striki, Kyriakos Manousakis, John S. Baras
MHCI
2009
Springer
14 years 16 days ago
Glancephone: an exploration of human expression
In this paper, we describe the design and ethnographic study of a phone developed so as to allow people to glance at each other, rather than simply message or voice call. Glanceph...
Richard H. R. Harper, Stuart Taylor
SIGGRAPH
2010
ACM
14 years 14 days ago
A connection between partial symmetry and inverse procedural modeling
In this paper, we address the problem of inverse procedural modeling: Given a piece of exemplar 3D geometry, we would like to find a set of rules that describe objects that are s...
Martin Bokeloh, Michael Wand, Hans-Peter Seidel
SP
2000
IEEE
134views Security Privacy» more  SP 2000»
14 years 11 days ago
Fang: A Firewall Analysis Engine
Today, even a moderately sized corporate intranet contains multiple firewalls and routers, which are all used to enforce various aspects of the global corporate security policy. ...
Alain J. Mayer, Avishai Wool, Elisha Ziskind
ICDCS
1999
IEEE
14 years 8 days ago
HiFi: A New Monitoring Architecture for Distributed Systems Management
With the increasing complexity of large-scale distributed (LSD) systems, an efficient monitoring mechanism has become an essential service for improving the performance and reliab...
Ehab S. Al-Shaer, Hussein M. Abdel-Wahab, Kurt Mal...
« Prev « First page 2482 / 2514 Last » Next »