Sciweavers

1192 search results - page 155 / 239
» Computing Weakest Readings
Sort
View
105
Voted
DSN
2005
IEEE
15 years 9 months ago
Authenticated System Calls
System call monitoring is a technique for detecting and controlling compromised applications by checking at runtime that each system call conforms to a policy that specifies the ...
Mohan Rajagopalan, Matti A. Hiltunen, Trevor Jim, ...
134
Voted
ICRA
2005
IEEE
142views Robotics» more  ICRA 2005»
15 years 9 months ago
Correspondenceless Ego-Motion Estimation Using an IMU
Abstract— Mobile robots can be easily equipped with numerous sensors which can aid in the tasks of localization and ego-motion estimation. Two such examples are Inertial Measurem...
Ameesh Makadia, Kostas Daniilidis
149
Voted
PERVASIVE
2005
Springer
15 years 9 months ago
A Conceptual Framework for Camera Phone-Based Interaction Techniques
This paper proposes and evaluates interaction techniques for camera-equipped mobile phones. The proposed techniques are based on a visual code system that provides a number of orie...
Michael Rohs, Philipp Zweifel
SPAA
2004
ACM
15 years 9 months ago
Online hierarchical cooperative caching
We address a hierarchical generalization of the well-known disk paging problem. In the hierarchical cooperative caching problem, a set of n machines residing in an ultrametric spa...
Xiaozhou Li, C. Greg Plaxton, Mitul Tiwari, Arun V...
139
Voted
MOBIDE
2003
ACM
15 years 9 months ago
TiNA: a scheme for temporal coherency-aware in-network aggregation
This paper presents TiNA, a scheme for minimizing energy consumption in sensor networks by exploiting end-user tolerance to temporal coherency. TiNA utilizes temporal coherency to...
Mohamed A. Sharaf, Jonathan Beaver, Alexandros Lab...