Sciweavers

9186 search results - page 1477 / 1838
» A Module System for Scheme
Sort
View
130
Voted
DSN
2007
IEEE
15 years 10 months ago
An Architectural Approach to Preventing Code Injection Attacks
Code injection attacks, despite being well researched, continue to be a problem today. Modern architectural solutions such as the NX-bit and PaX have been useful in limiting the a...
Ryan Riley, Xuxian Jiang, Dongyan Xu
119
Voted
GLOBECOM
2007
IEEE
15 years 10 months ago
The Design and Evaluation of a Wireless Sensor Network for Mine Safety Monitoring
– This paper describes a wireless sensor network for mine safety monitoring. Based on the characteristics of underground mine gallery and the requirements for mine safety monitor...
Xiaoguang Niu, Xi Huang, Ze Zhao, Yuhe Zhang, Chan...
139
Voted
ICAT
2007
IEEE
15 years 10 months ago
A PDA-based See-through Interface within an Immersive Environment
- With the use of an immersive display system such as the CAVE, the user is able to perceive a 3D environment realistically. However, the interaction on such systems faces some dif...
Miranda Miranda Miguel, Takefumi Ogawa, Kiyoshi Ki...
138
Voted
ICC
2007
IEEE
128views Communications» more  ICC 2007»
15 years 10 months ago
Supporting the Sink Mobility: a Case Study for Wireless Sensor Networks
— This paper deals with a system level design solution to support information gathering in the presence of a mobile querying node that experiences frequent disconnections from a ...
David Tacconi, Iacopo Carreras, Daniele Miorandi, ...
117
Voted
ICC
2007
IEEE
123views Communications» more  ICC 2007»
15 years 10 months ago
A Game Theoretic Solution for Exploiting Multiuser Diversity in Cooperative Slotted Aloha
— In multiuser systems, multiuser diversity gains can be achieved by assigning channels to users with higher channel quality. To avoid the extensive information exchange required...
Cristina Comaniciu, Dandan Wang, Hlaing Minn, Naof...
« Prev « First page 1477 / 1838 Last » Next »