Sciweavers

39 search results - page 7 / 8
» An Abstract Argumentation-based Strategy for Reading Order D...
Sort
View
RV
2010
Springer
127views Hardware» more  RV 2010»
13 years 4 months ago
You Should Better Enforce Than Verify
This tutorial deals with runtime enforcement which is an extension of runtime verification aiming to circumvent misbehaviors of systems. After an historical overview of previous a...
Yliès Falcone
GLOBECOM
2009
IEEE
14 years 15 days ago
Maximum-Likelihood Sequence Detector for Dynamic Mode High Density Probe Storage
— There is an ever increasing need for storing data in smaller and smaller form factors driven by the ubiquitous use and increased demands of consumer electronics. A new approach...
Naveen Kumar, Pranav Agarwal, Aditya Ramamoorthy, ...
JUCS
2008
147views more  JUCS 2008»
13 years 5 months ago
Security and Usability Aspects of Man-in-the-Middle Attacks on ZRTP
Abstract: ZRTP is a protocol designed to set up a shared secret between two communication parties which is subsequently used to secure the media stream (i.e. the audio data) of a V...
Martin Petraschek, Thomas Hoeher, Oliver Jung, Hel...
AOSD
2007
ACM
13 years 9 months ago
Declarative failure recovery for sensor networks
Wireless sensor networks consist of a system of distributed sensors embedded in the physical world, and promise to allow observation of previously unobservable phenomena. Since th...
Ramakrishna Gummadi, Nupur Kothari, Todd D. Millst...
DICTA
2009
13 years 6 months ago
Modeling Image Context Using Object Centered Grid
Abstract--Context plays a valuable role in any image understanding task confirmed by numerous studies which have shown the importance of contextual information in computer vision t...
Sobhan Naderi Parizi, Ivan Laptev, Alireza Tavakol...