Sciweavers

16190 search results - page 2875 / 3238
» Applicative programming with effects
Sort
View
TRIDENTCOM
2006
IEEE
15 years 6 months ago
Emulation versus simulation: A case study of TCP-targeted denial of service attacks
—In this paper, we investigate the applicability of simulation and emulation for denial of service (DoS) attack experimentation. As a case study, we consider low-rate TCP-targete...
Roman Chertov, Sonia Fahmy, Ness B. Shroff
109
Voted
APGV
2006
ACM
103views Visualization» more  APGV 2006»
15 years 6 months ago
Perception of image motion during head movement
Previous studies have shown that self-motion has an inhibiting effect on concurrent 3D motion perception. To investigate whether self-motion similarly impairs concurrent image mot...
Li Li, Bernard D. Adelstein, Stephen R. Ellis
83
Voted
ETRA
2006
ACM
101views Biometrics» more  ETRA 2006»
15 years 6 months ago
Gaze-contingent temporal filtering of video
We describe an algorithm for manipulating the temporal resolution of a video in real time, contingent upon the viewer’s direction of gaze. The purpose of this work is to study t...
Martin Böhme, Michael Dorr, Thomas Martinetz,...
91
Voted
MM
2006
ACM
103views Multimedia» more  MM 2006»
15 years 6 months ago
Progressive cut
Recently, interactive image cutout technique becomes prevalent for image segmentation problem due to its easy-to-use nature. However, most existing stroke-based interactive object...
Chao Wang, Qiong Yang, Mo Chen, Xiaoou Tang, Zhong...
ICDCS
2005
IEEE
15 years 6 months ago
Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks
Sensors’ locations play a critical role in many sensor network applications. A number of techniques have been proposed recently to discover the locations of regular sensors base...
Donggang Liu, Peng Ning, Wenliang Du
« Prev « First page 2875 / 3238 Last » Next »