Sciweavers

2897 search results - page 525 / 580
» Test Case Integration: From Components to Systems
Sort
View
IPPS
2007
IEEE
15 years 10 months ago
Security Threat Prediction in a Local Area Network Using Statistical Model
In today’s large and complex network scenario vulnerability scanners play a major role from security perspective by proactively identifying the known security problems or vulner...
Somak Bhattacharya, S. K. Ghosh
EUROSSC
2007
Springer
15 years 10 months ago
Escalation:  Complex Event Detection in Wireless Sensor Networks
We present a new approach for the detection of complex events in Wireless Sensor Networks. Complex events are sets of data points that correspond to interesting or unusual patterns...
Michael Zoumboulakis, George Roussos
135
Voted
SMA
2006
ACM
150views Solid Modeling» more  SMA 2006»
15 years 10 months ago
Conformal virtual colon flattening
We present an efficient colon flattening algorithm using conformal structure, which is angle-preserving and minimizes the global distortion. Moreover, our algorithm is general w...
Wei Hong, Xianfeng Gu, Feng Qiu, Miao Jin, Arie E....
PODC
2005
ACM
15 years 9 months ago
Advanced contention management for dynamic software transactional memory
The obstruction-free Dynamic Software Transactional Memory (DSTM) system of Herlihy et al. allows only one transaction at a time to acquire an object for writing. Should a second ...
William N. Scherer III, Michael L. Scott
MUM
2004
ACM
99views Multimedia» more  MUM 2004»
15 years 9 months ago
The Road Rager: making use of traffic encounters in a mobile multiplayer game
We present Road Rager, a prototype built in order to explore our hypothesis that proximity and a possibility to identify other players during temporary encounters could spur socia...
Liselott Brunnberg