Sciweavers

13618 search results - page 2484 / 2724
» The Newton Operating System
Sort
View
NDSS
2008
IEEE
15 years 11 months ago
Automatic Network Protocol Analysis
Protocol reverse engineering is the process of extracting application-level specifications for network protocols. Such specifications are very helpful in a number of security-re...
Gilbert Wondracek, Paolo Milani Comparetti, Christ...
141
Voted
SRDS
2008
IEEE
15 years 11 months ago
Probabilistic Failure Detection for Efficient Distributed Storage Maintenance
Distributed storage systems often use data replication to mask failures and guarantee high data availability. Node failures can be transient or permanent. While the system must ge...
Jing Tian, Zhi Yang, Wei Chen, Ben Y. Zhao, Yafei ...
132
Voted
TABLETOP
2008
IEEE
15 years 11 months ago
Pokey: Interaction through covert structured light
In this paper we describe a method to support interaction with a cellphone based projectorcamera system. We describe a novel approach that uses a technique known in Computer Visio...
Christopher Richard Wren, Yuri A. Ivanov, Paul A. ...
113
Voted
VR
2008
IEEE
188views Virtual Reality» more  VR 2008»
15 years 11 months ago
The Two-User Seating Buck: Enabling Face-to-Face Discussions of Novel Car Interface Concepts
The automotive industry uses physical seating bucks, which are minimal mockups of a car interior, to assess various aspects of the planned interior early in the development proces...
Holger Salzmann, Bernd Froehlich
WCNC
2008
IEEE
15 years 11 months ago
Distributed Energy Efficient Spectrum Access in Wireless Cognitive Radio Sensor Networks
—In this paper, a wireless cognitive radio sensor network is considered, where each sensor node is equipped with cognitive radio and the network is a multi-carrier system operati...
Song Gao, Lijun Qian, Dhadesugoor R. Vaman
« Prev « First page 2484 / 2724 Last » Next »