Sciweavers

5164 search results - page 934 / 1033
» Consistency of the EKF-SLAM Algorithm
Sort
View
DRM
2005
Springer
15 years 3 months ago
Hybrid static-dynamic attacks against software protection mechanisms
Advances in reverse engineering and program analyses have made software extremely vulnerable to malicious host attacks. These attacks typically take the form of intellectual prope...
Matias Madou, Bertrand Anckaert, Bjorn De Sutter, ...
KDD
2005
ACM
149views Data Mining» more  KDD 2005»
15 years 3 months ago
A distributed learning framework for heterogeneous data sources
We present a probabilistic model-based framework for distributed learning that takes into account privacy restrictions and is applicable to scenarios where the different sites ha...
Srujana Merugu, Joydeep Ghosh
NOSSDAV
2005
Springer
15 years 3 months ago
MOPAR: a mobile peer-to-peer overlay architecture for interest management of massively multiplayer online games
In this paper we propose a fully distributed peer-to-peer (P2P) infrastructure supporting Networked Virtual Environment (NVE) applications, such as massively multiplayer online ga...
Anthony (Peiqun) Yu, Son T. Vuong
IUI
2004
ACM
15 years 3 months ago
WOLD: a mixed-initiative wizard for producing multi-platform user interfaces
WOLD (Wizard fOr Leveraging the Development of multi-platform user interfaces) helps designers to produce running user interfaces to data bases of information systems simultaneous...
Julien Stocq, Jean Vanderdonckt
SENSYS
2004
ACM
15 years 3 months ago
The flooding time synchronization protocol
Wireless sensor network applications, similarly to other distributed systems, often require a scalable time synchronization service enabling data consistency and coordination. Thi...
Miklós Maróti, Branislav Kusy, Gyula...