Sciweavers

2714 search results - page 220 / 543
» Under the table interaction
Sort
View
115
Voted
IFIP
2003
Springer
15 years 9 months ago
On Demand Network Level Service Deployment in Ad Hoc Networks
Many network level services such as routing, auto-addressing and, security have been proposed for ad hoc networks. Each has characteristics that may cause it to outperform similar ...
Daniel Prince, Andrew Scott, W. D. Shepherd
FOCS
2002
IEEE
15 years 9 months ago
Concurrent Zero Knowledge with Logarithmic Round-Complexity
We show that every language in NP has a (black-box) concurrent zero-knowledge proof system using ˜O(log n) rounds of interaction. The number of rounds in our protocol is optimal,...
Manoj Prabhakaran, Alon Rosen, Amit Sahai
147
Voted
VISUALIZATION
2002
IEEE
15 years 9 months ago
A Case Study on Multiresolution Visualization of Local Rainfall from Weather Radar Measurements
Weather radars can measure the backscatter from rain drops in the atmosphere. A complete radar scan provides three–dimensional precipitation information. For the understanding o...
Thomas Gerstner, Dirk Meetschen, Susanne Crewell, ...
ICSE
2009
IEEE-ACM
15 years 8 months ago
An Empirical Study of Testing File-System-Dependent Software with Mock Objects
Unit testing is a technique of testing a single unit of a program in isolation. The testability of the unit under test can be reduced when the unit interacts with its environment....
Madhuri R. Marri, Tao Xie, Nikolai Tillmann, Jonat...
NDSS
2000
IEEE
15 years 8 months ago
Building Adaptive and Agile Applications Using Intrusion Detection and Response
Traditional Intrusion Detection Systems (IDSs) mostly work off-line, without any direct runtime interaction or coordination with the applications (and with other IDSs) that they a...
Joseph P. Loyall, Partha Pratim Pal, Richard E. Sc...