Sciweavers

8177 search results - page 1458 / 1636
» Detecting System Emulators
Sort
View
136
Voted
SENSYS
2003
ACM
15 years 9 months ago
Cooperative tracking with binary-detection sensor networks
We present a novel method for tracking the movement of people or vehicles in open outdoor environments using sensor networks. Unlike other sensor network-based methods, which depe...
Kirill Mechitov, Sameer Sundresh, YoungMin Kwon, G...
ACNS
2003
Springer
131views Cryptology» more  ACNS 2003»
15 years 9 months ago
On the Security of Two Threshold Signature Schemes with Traceable Signers
A (t, n) threshold signature scheme allows t or more group members to generate signatures on behalf of a group with n members, while any t−1 or less members cannot do the same th...
Guilin Wang, Xiaoxi Han, Bo Zhu
120
Voted
CICLING
2003
Springer
15 years 9 months ago
Positive Grammar Checking: A Finite State Approach
Abstract. This paper reports on the development of a finite state system for finding grammar errors without actually specifying the error. A corpus of Swedish text written by chi...
Sylvana Sofkova Hashemi, Robin Cooper, Robert Ande...
133
Voted
DSOM
2003
Springer
15 years 9 months ago
A Method on Multimedia Service Traffic Monitoring and Analysis
The use of multimedia service applications is growing rapidly on the Internet. These applications are generating a huge volume of network traffic, which has a great impact on netw...
Hun-Jeong Kang, Myung-Sup Kim, James Won-Ki Hong
153
Voted
ESOP
2003
Springer
15 years 9 months ago
Modeling Web Interactions
Programmers confront a minefield when they design interactive Web programs. Web interactions take place via Web browsers. With browsers, consumers can whimsically navigate among t...
Paul T. Graunke, Robert Bruce Findler, Shriram Kri...
« Prev « First page 1458 / 1636 Last » Next »