Sciweavers

40 search results - page 8 / 8
» On the perimeter of fat objects
Sort
View
MOBIHOC
2010
ACM
13 years 2 months ago
Data preservation under spatial failures in sensor networks
In this paper, we address the problem of preserving generated data in a sensor network in case of node failures. We focus on the type of node failures that have explicit spatial s...
Navid Hamed Azimi, Himanshu Gupta, Xiaoxiao Hou, J...
CN
2007
137views more  CN 2007»
13 years 4 months ago
Defending against hitlist worms using network address space randomization
Worms are self-replicating malicious programs that represent a major security threat for the Internet, as they can infect and damage a large number of vulnerable hosts at timescal...
Spyros Antonatos, Periklis Akritidis, Evangelos P....
APGV
2005
ACM
146views Visualization» more  APGV 2005»
13 years 10 months ago
A similarity-based approach to perceptual feature validation
Which object properties matter most in human perception may well vary according to sensory modality, an important consideration for the design of multimodal interfaces. In this st...
Theresa Cooke, Florian Steinke, Christian Wallrave...
SIGGRAPH
2010
ACM
13 years 8 months ago
Camera-less Smart Laser Projector
We introduce here our latest ‘smart laser projector’ prototype, i.e, a modified laser-based projector capable of augmenting all kind of surfaces while simultaneously using th...
Álvaro Cassinelli, Alexis Zerroug, Yoshihir...
AAIM
2006
Springer
129views Algorithms» more  AAIM 2006»
13 years 8 months ago
Secure Overlay Network Design
Due to the increasing security threats on the Internet, new overlay network architectures have been proposed to secure privileged services. In these architectures, the application...
Erran L. Li, Mohammad Mahdian, Vahab S. Mirrokni