Sciweavers

9245 search results - page 1677 / 1849
» Virtual
Sort
View
129
Voted
INFOCOM
2012
IEEE
13 years 5 months ago
Stochastic analysis of horizontal IP scanning
—Intrusion Detection Systems (IDS) have become ubiquitous in the defense against virus outbreaks, malicious exploits of OS vulnerabilities, and botnet proliferation. As attackers...
Derek Leonard, Zhongmei Yao, Xiaoming Wang, Dmitri...
167
Voted
TOG
2012
265views Communications» more  TOG 2012»
13 years 5 months ago
Tailored displays to compensate for visual aberrations
We introduce tailored displays that enhance visual acuity by decomposing virtual objects and placing the resulting anisotropic pieces into the subject’s focal range. The goal is...
Vitor F. Pamplona, Manuel M. Oliveira, Daniel G. A...
151
Voted
PET
2012
Springer
13 years 5 months ago
Practical Privacy Preserving Cloud Resource-Payment for Constrained Clients
The continuing advancements in microprocessor technologies are putting more and more computing power into small devices. Today smartphones are especially popular. Nevertheless, for...
Martin Pirker, Daniel Slamanig, Johannes Winter
126
Voted
ACL
2012
13 years 5 months ago
Learning High-Level Planning from Text
Comprehending action preconditions and effects is an essential step in modeling the dynamics of the world. In this paper, we express the semantics of precondition relations extrac...
S. R. K. Branavan, Nate Kushman, Tao Lei, Regina B...
159
Voted
LICS
2012
IEEE
13 years 5 months ago
A Higher-Order Distributed Calculus with Name Creation
—This paper introduces HOpiPn, the higher-order pi-calculus with passivation and name creation, and develops an equivalence theory for this calculus. Passivation [Schmitt and Ste...
Adrien Piérard, Eijiro Sumii
« Prev « First page 1677 / 1849 Last » Next »