Sciweavers

941 search results - page 167 / 189
» The Second Order Particle System
Sort
View
CCS
2009
ACM
14 years 5 months ago
A new cell counter based attack against tor
Various low-latency anonymous communication systems such as Tor and Anoymizer have been designed to provide anonymity service for users. In order to hide the communication of user...
Zhen Ling, Junzhou Luo, Wei Yu, Xinwen Fu, Dong Xu...
SSS
2009
Springer
195views Control Systems» more  SSS 2009»
14 years 5 months ago
Anonymous Transactions in Computer Networks
Abstract. We present schemes for providing anonymous transactions while privacy and anonymity are preserved, providing user anonymous authentication in distributed networks such as...
Shlomi Dolev, Marina Kopeetsky
IROS
2006
IEEE
132views Robotics» more  IROS 2006»
14 years 5 months ago
3D interaction technique to enhance telemanipulation tasks using virtual environment
Abstract— This paper gives preliminary results about the utilization of an interaction technique called FOLLOW-ME to fasten the selection task for teleoperation system. The imple...
Nassima Ouramdane-Djerrah, Frédéric ...
COMPSAC
2009
IEEE
14 years 3 months ago
Tool Support for Design Pattern Recognition at Model Level
Given the rapid rise of model-driven software development methodologies, it is highly desirable that tools be developed to support the use of design patterns in this context. This...
Hong Zhu, Ian Bayley, Lijun Shan, Richard Amphlett
AIIA
2003
Springer
14 years 2 months ago
Applying Artificial Intelligence to Clinical Guidelines: The GLARE Approach
In this paper, we present GLARE, a domain-independent system for acquiring, representing and executing clinical guidelines. GLARE is characterized by the adoption of Artificial Int...
Paolo Terenziani, Stefania Montani, Alessio Bottri...