Sciweavers

546 search results - page 66 / 110
» Using and Detecting Links in Wikipedia
Sort
View
106
Voted
BROADNETS
2007
IEEE
15 years 10 months ago
Strategic deployment of network monitors for attack attribution
—Attacks launched over the Internet have become a pressing problem. Attackers make use of a variety of techniques to anonymize their traffic, in order to escape detection and pr...
Young June Pyun, Douglas S. Reeves
139
Voted
GLOBECOM
2006
IEEE
15 years 10 months ago
Defense against Routing Disruption Attacks in Mobile Ad Hoc Networks
—We propose a secure routing architecture for Mobile Ad hoc NETworks (MANETs) called ThroughpUt-Feedback (TUF) routing, which is resilient against a wide range of routing disrupt...
Ruiliang Chen, Michael Snow, Jung Min Park, M. Tam...
LADC
2005
Springer
15 years 9 months ago
Timed Asynchronous Distributed Systems
We present a framework for building fail-safe hard real-time applications in timed asynchronous distributed systems subject to communication partitions and performance, omission, ...
Christof Fetzer
145
Voted
ACMACE
2005
ACM
15 years 9 months ago
SymBall: camera driven table tennis for mobile phones
We present a table tennis game concept, implemented for Symbian OS/Series 60 mobile phones, using the phone's integrated camera as the main game controller. The game demonstr...
Mika Hakkarainen, Charles Woodward
DAGM
2008
Springer
15 years 5 months ago
Learning Visual Compound Models from Parallel Image-Text Datasets
Abstract. In this paper, we propose a new approach to learn structured visual compound models from shape-based feature descriptions. We use captioned text in order to drive the pro...
Jan Moringen, Sven Wachsmuth, Sven J. Dickinson, S...