Sciweavers

15792 search results - page 3030 / 3159
» Computational Abstraction Steps
Sort
View
112
Voted
MIDDLEWARE
2010
Springer
14 years 11 months ago
FaReCast: Fast, Reliable Application Layer Multicast for Flash Dissemination
Abstract. To disseminate messages from a single source to a large number of targeted receivers, a natural approach is the tree-based application layer multicast (ALM). However, in ...
Kyungbaek Kim, Sharad Mehrotra, Nalini Venkatasubr...
95
Voted
PERCOM
2010
ACM
14 years 11 months ago
Robopedia: Leveraging Sensorpedia for web-enabled robot control
Abstract— There is a growing interest in building Internetscale sensor networks that integrate sensors from around the world into a single unified system. In contrast, robotics ...
Richard Edwards, Lynne E. Parker, David Resseguie
115
Voted
PERVASIVE
2010
Springer
14 years 11 months ago
LOC8: A Location Model and Extensible Framework for Programming with Location
ing model abstracts over various types of positioning systems and incorporates the capture of uncertainty, serving as a foundation on which developers can apply sensor-fusion techn...
Graeme Stevenson, Juan Ye, Simon Dobson, Paddy Nix...
91
Voted
RAID
2010
Springer
14 years 11 months ago
An Analysis of Rogue AV Campaigns
Abstract. Rogue antivirus software has recently received extensive attention, justified by the diffusion and efficacy of its propagation. We present a longitudinal analysis of th...
Marco Cova, Corrado Leita, Olivier Thonnard, Angel...
108
Voted
RAID
2010
Springer
14 years 11 months ago
Detecting the Onset of Infection for Secure Hosts
Abstract. Software flaws in applications such as a browser may be exploited by attackers to launch drive-by-download (DBD), which has become the major vector of malware infection....
Kui Xu, Qiang Ma, Danfeng (Daphne) Yao
« Prev « First page 3030 / 3159 Last » Next »