Sciweavers

485 search results - page 43 / 97
» Easy Keys for OWL
Sort
View
CCS
2008
ACM
15 years 2 days ago
SEAR: a secure efficient ad hoc on demand routing protocol for wireless networks
Multi-hop routing is essential to the operation of wireless ad hoc networks. Unfortunately, it is very easy for an adversary to forge or modify routing messages to inflict severe ...
Qing Li, Yih-Chun Hu, Meiyuan Zhao, Adrian Perrig,...
NIPS
2008
14 years 11 months ago
Load and Attentional Bayes
Selective attention is a most intensively studied psychological phenomenon, rife with theoretical suggestions and schisms. A critical idea is that of limited capacity, the allocat...
Peter Dayan
AVI
2006
14 years 11 months ago
Laser pointer interaction techniques using peripheral areas of screens
This paper presents new interaction techniques that use a laser pointer to directly manipulate applications displayed on a large screen. The techniques are based on goal crossing,...
Buntarou Shizuki, Takaomi Hisamatsu, Shin Takahash...
DAGSTUHL
2006
14 years 11 months ago
Denial of Service Protection with Beaver
We present Beaver, a method and architecture to "build dams" to protect servers from Denial of Service (DoS) attacks. Beaver allows efficient filtering of DoS traffic us...
Gal Badishi, Idit Keidar, Amir Herzberg, Oleg Roma...
GRAPHICSINTERFACE
2004
14 years 11 months ago
Decoupling BRDFs from Surface Mesostructures
We present a technique for the easy acquisition of realistic materials and mesostructures, without acquiring the actual BRDF. The method uses the observation that under certain ci...
Jan Kautz, Mirko Sattler, Ralf Sarlette, Reinhard ...