Sciweavers

826 search results - page 74 / 166
» What Triggers a Behavior
Sort
View
IJNSEC
2008
127views more  IJNSEC 2008»
15 years 4 months ago
Inter-domain Routing Stability Dynamics During Infrastructure Stress Events: The Internet Worm Menace
The Internet is crucial to business, government, education and many other facets of society and its continuing scalability places serious challenges on the routing system's c...
Francesco Palmieri
TMC
2008
146views more  TMC 2008»
15 years 4 months ago
Cross-Layer Interaction of TCP and Ad Hoc Routing Protocols in Multihop IEEE 802.11 Networks
In this research, we first investigate the cross-layer interaction between TCP and routing protocols in the IEEE 802.11 ad hoc network. On-demand ad hoc routing protocols respond t...
Kitae Nahm, Ahmed Helmy, C. C. Jay Kuo
RAID
2010
Springer
15 years 2 months ago
Detecting the Onset of Infection for Secure Hosts
Abstract. Software flaws in applications such as a browser may be exploited by attackers to launch drive-by-download (DBD), which has become the major vector of malware infection....
Kui Xu, Qiang Ma, Danfeng (Daphne) Yao
CSCW
2012
ACM
14 years 3 days ago
Organizing without formal organization: group identification, goal setting and social modeling in directing online production
A challenge for many online production communities is to direct their members to accomplish tasks that are important to the group, even when these tasks may not match individual m...
Haiyi Zhu, Robert Kraut, Aniket Kittur
TOG
2012
208views Communications» more  TOG 2012»
13 years 6 months ago
Video-based 3D motion capture through biped control
Marker-less motion capture is a challenging problem, particularly when only monocular video is available. We estimate human motion from monocular video by recovering three-dimensi...
Marek Vondrak, Leonid Sigal, Jessica K. Hodgins, O...