Sciweavers

731 search results - page 145 / 147
» Special Section on Information and Communication System Secu...
Sort
View
MOBICOM
2004
ACM
14 years 2 months ago
Architecture and techniques for diagnosing faults in IEEE 802.11 infrastructure networks
The wide-scale deployment of IEEE 802.11 wireless networks has generated significant challenges for Information Technology (IT) departments in corporations. Users frequently comp...
Atul Adya, Paramvir Bahl, Ranveer Chandra, Lili Qi...
ICRA
2006
IEEE
117views Robotics» more  ICRA 2006»
14 years 2 months ago
A Neurally Controlled Robot Competes and Cooperates with Humans in Segway Soccer
— A new RoboCup soccer league is being developed, focusing on human-robot interaction. In this league each team consists of both a human player, mounted on a Segway HT scooter, a...
Jason Fleischer, Botond Szatmáry, Donald Hu...
HICSS
2003
IEEE
143views Biometrics» more  HICSS 2003»
14 years 2 months ago
Formation, Routing, and Maintenance Protocols for the BlueRing Scatternet of Bluetooths
The basic networking unit in Bluetooth is piconet, and a larger-area Bluetooth network can be formed by multiple piconets, called scatternet. However, the structure of scatternets...
Ting-Yu Lin, Yu-Chee Tseng, Keng-Ming Chang, Chun-...
CORR
2010
Springer
66views Education» more  CORR 2010»
13 years 8 months ago
Polyominoes Simulating Arbitrary-Neighborhood Zippers and Tilings
This paper provides a bridge between the classical tiling theory and cellular automata on one side, and the complex neighborhood self-assembling situations that exist in practice,...
Lila Kari, Benoît Masson
EUROSYS
2009
ACM
14 years 5 months ago
Pointless tainting?: evaluating the practicality of pointer tainting
This paper evaluates pointer tainting, an incarnation of Dynamic Information Flow Tracking (DIFT), which has recently become an important technique in system security. Pointer tai...
Asia Slowinska, Herbert Bos