Sciweavers

20294 search results - page 3967 / 4059
» Algorithmic Information Theory
Sort
View
WOWMOM
2005
ACM
184views Multimedia» more  WOWMOM 2005»
15 years 10 months ago
ALCA: A New Scheme for Power Control on 802.11 Ad Hoc Networks
— This paper presents the ALCA (Asymmetric Link Collision Avoidance) protocol. ALCA was designed to deal with a known deficiency of the Basic Scheme [1] for power control in 802...
Alexandre Andrade Pires, José Ferreira de R...
CAIP
2005
Springer
212views Image Analysis» more  CAIP 2005»
15 years 10 months ago
3D Modeling of Humans with Skeletons from Uncalibrated Wide Baseline Views
In order to achieve precise, accurate and reliable tracking of human movement, a 3D human model that is very similar to the subject is essential. In this paper, we present a new sy...
Chee Kwang Quah, André Gagalowicz, Richard ...
CCS
2005
ACM
15 years 10 months ago
Automatic placement of authorization hooks in the linux security modules framework
We present a technique for automatic placement of authorization hooks, and apply it to the Linux security modules (LSM) framework. LSM is a generic framework which allows diverse ...
Vinod Ganapathy, Trent Jaeger, Somesh Jha
CCS
2005
ACM
15 years 10 months ago
Automatic diagnosis and response to memory corruption vulnerabilities
Cyber attacks against networked computers have become relentless in recent years. The most common attack method is to exploit memory corruption vulnerabilities such as buffer ove...
Jun Xu, Peng Ning, Chongkyung Kil, Yan Zhai, Chris...
COCO
2005
Springer
110views Algorithms» more  COCO 2005»
15 years 10 months ago
Prior Entanglement, Message Compression and Privacy in Quantum Communication
Consider a two-party quantum communication protocol for computing some function f : {0, 1}n × {0, 1}n → Z. We show that the first message of P can be compressed to O(k) classi...
Rahul Jain, Jaikumar Radhakrishnan, Pranab Sen
« Prev « First page 3967 / 4059 Last » Next »