Sciweavers

2223 search results - page 394 / 445
» Events in Property Patterns
Sort
View
INFOCOM
2011
IEEE
14 years 5 months ago
Identity-based attack detection in mobile wireless networks
—Identity-based attacks (IBAs) are one of the most serious threats to wireless networks. Recently, received signal strength (RSS) based detection mechanisms were proposed to dete...
Kai Zeng, Kannan Govindan, Daniel Wu, Prasant Moha...
IUI
2011
ACM
14 years 4 months ago
Protractor3D: a closed-form solution to rotation-invariant 3D gestures
Protractor 3D is a gesture recognizer that extends the 2D touch screen gesture recognizer Protractor [8] to 3D gestures. It inherits many of Protractor’s desirable properties, s...
Sven G. Kratz, Michael Rohs
IWANN
2011
Springer
14 years 4 months ago
Isometric Coding of Spiking Haptic Signals by Peripheral Somatosensory Neurons
Abstract. We study how primary tactile afferents encode relevant contact features to mediate early processing of haptic information. In this paper, we apply metrical information t...
Romain Brasselet, Roland S. Johansson, Angelo Arle...
COMSNETS
2012
168views more  COMSNETS 2012»
13 years 9 months ago
Limitations of scanned human copresence encounters for modelling proximity-borne malware
—Patterns of human encounters, which are difficult to observe directly, are fundamental to the propagation of mobile malware aimed at infecting devices in spatial proximity. We ...
James Mitchell, Eamonn O'Neill, Gjergji Zyba, Geof...
PODC
2009
ACM
16 years 2 months ago
Simple and efficient asynchronous byzantine agreement with optimal resilience
Consider a completely asynchronous network consisting of n parties where every two parties are connected by a private channel. An adversary At with unbounded computing power activ...
Arpita Patra, Ashish Choudhary, C. Pandu Rangan