Sciweavers

21430 search results - page 4013 / 4286
» Abstract Effective Models
Sort
View
PADS
2005
ACM
15 years 10 months ago
Routing Worm: A Fast, Selective Attack Worm Based on IP Address Information
Most well-known Internet worms, such as Code Red, Slammer, and Blaster, infected vulnerable computers by scanning the entire Internet IPv4 space. In this paper, we present a new s...
Cliff Changchun Zou, Donald F. Towsley, Weibo Gong...
PLDI
2005
ACM
15 years 10 months ago
Programming ad-hoc networks of mobile and resource-constrained devices
Ad-hoc networks of mobile devices such as smart phones and PDAs represent a new and exciting distributed system architecture. Building distributed applications on such an architec...
Yang Ni, Ulrich Kremer, Adrian Stere, Liviu Iftode
SMA
2005
ACM
167views Solid Modeling» more  SMA 2005»
15 years 10 months ago
Boolean operations on 3D selective Nef complexes: optimized implementation and experiments
Nef polyhedra in d-dimensional space are the closure of half-spaces under boolean set operation. In consequence, they can represent non-manifold situations, open and closed sets, ...
Peter Hachenberger, Lutz Kettner
CCS
2005
ACM
15 years 10 months ago
An auctioning reputation system based on anomaly
Existing reputation systems used by online auction houses do not address the concern of a buyer shopping for commodities—finding a good bargain. These systems do not provide in...
Shai Rubin, Mihai Christodorescu, Vinod Ganapathy,...
CVBIA
2005
Springer
15 years 10 months ago
Analyzing Anatomical Structures: Leveraging Multiple Sources of Knowledge
Analysis of medical images, especially the extraction of anatomical structures, is a critical component of many medical applications: surgical planning and navigation, and populati...
W. Eric L. Grimson, Polina Golland
« Prev « First page 4013 / 4286 Last » Next »