Sciweavers

12183 search results - page 2343 / 2437
» Computers under Attacks!
Sort
View
IMC
2003
ACM
15 years 5 months ago
On the correspondency between TCP acknowledgment packet and data packet
At the TCP sender side, the arrival of an ack packet always triggers the sender to send data packets, which establishes a correspondency between the arrived ack packet and the sen...
Guohan Lu, Xing Li
ISPD
2003
ACM
133views Hardware» more  ISPD 2003»
15 years 5 months ago
Optimal minimum-delay/area zero-skew clock tree wire-sizing in pseudo-polynomial time
In 21st-Century VLSI design, clocking plays crucial roles for both performance and timing convergence. Due to their non-convex nature, optimal minimum-delay/area zero-skew wire-si...
Jeng-Liang Tsai, Tsung-Hao Chen, Charlie Chung-Pin...
IUI
2003
ACM
15 years 5 months ago
Lessons learned in modeling schizophrenic and depressed responsive virtual humans for training
This paper describes lessons learned in developing the linguistic, cognitive, emotional, and gestural models underlying virtual human behavior in a training application designed t...
Robert C. Hubal, Geoffrey A. Frank, Curry I. Guinn
MM
2003
ACM
239views Multimedia» more  MM 2003»
15 years 5 months ago
Foreground object detection from videos containing complex background
This paper proposes a novel method for detection and segmentation of foreground objects from a video which contains both stationary and moving background objects and undergoes bot...
Liyuan Li, Weimin Huang, Irene Y. H. Gu, Qi Tian
MOBICOM
2003
ACM
15 years 5 months ago
Towards realistic mobility models for mobile ad hoc networks
One of the most important methods for evaluating the characteristics of ad hoc networking protocols is through the use of simulation. Simulation provides researchers with a number...
Amit P. Jardosh, Elizabeth M. Belding-Royer, Kevin...
« Prev « First page 2343 / 2437 Last » Next »