Sciweavers

6192 search results - page 1061 / 1239
» Distributed Control of Attention
Sort
View
AINA
2004
IEEE
15 years 7 months ago
Authenticated Autonomous System Traceback
The design of the IP protocol makes it difficult to reliably identify the originator of an IP packet making the defense against Distributed Denial of Service attacks one of the ha...
Vamsi Paruchuri, Arjan Durresi, Rajgopal Kannan, S...
AUIC
2004
IEEE
15 years 7 months ago
Wearable Microphone Array as User Interface
We are at present enabled with machine-empowered technologies. The future is certainly looking towards human-empowered technologies, which should enable mobile user with natural w...
Yong Xu, Mingjiang Yang, Yanxin Yan, Jianfeng Chen
CBSE
2006
Springer
15 years 7 months ago
A Prototype Tool for Software Component Services in Embedded Real-Time Systems
Abstract. The use of software component models has become popular during the last decade, in particular in the development of software for desktop applications and distributed info...
Frank Lüders, Daniel Flemström, Anders W...
CCS
2006
ACM
15 years 7 months ago
TinySeRSync: secure and resilient time synchronization in wireless sensor networks
Accurate and synchronized time is crucial in many sensor network applications due to the need for consistent distributed sensing and coordination. In hostile environments where an...
Kun Sun, Peng Ning, Cliff Wang
CIT
2006
Springer
15 years 7 months ago
QoS Constrained Adaptive Routing Protocol For Mobile Adhoc Networks
The ease of deployment and the infrastructure less nature of Mobile Ad hoc Networks (MANETs) make them highly desirable for the present day multi media communications. Traditional ...
Vinod Kone, Sukumar Nandi
« Prev « First page 1061 / 1239 Last » Next »