Sciweavers

1980 search results - page 280 / 396
» Feature Flow Fields
Sort
View
125
Voted
MOBIHOC
2003
ACM
16 years 3 months ago
ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks
In hostile environments, the enemy can launch traffic analysis against interceptable routing information embedded in routing messages and data packets. Allowing adversaries to tra...
Jiejun Kong, Xiaoyan Hong
133
Voted
ICCAD
2007
IEEE
157views Hardware» more  ICCAD 2007»
16 years 12 days ago
Performance and power evaluation of a 3D CMOS/nanomaterial reconfigurable architecture
—In this paper, we introduce a novel reconfigurable architecture, named 3D nFPGA, which utilizes 3D integration techniques and new nanoscale materials synergistically. The propos...
Chen Dong, Deming Chen, Sansiri Tanachutiwat, Wei ...
123
Voted
MIR
2010
ACM
200views Multimedia» more  MIR 2010»
15 years 10 months ago
Controlling your TV with gestures
Vision-based user interfaces enable natural interaction modalities such as gestures. Such interfaces require computationally intensive video processing at low latency. We demonstr...
Ming-yu Chen, Lily B. Mummert, Padmanabhan Pillai,...
96
Voted
PERVASIVE
2010
Springer
15 years 10 months ago
GasSense: Appliance-Level, Single-Point Sensing of Gas Activity in the Home
This paper presents GasSense, a low-cost, single-point sensing solution for automatically identifying gas use down to its source (e.g., water heater, furnace, fireplace). This work...
Gabe Cohn, Sidhant Gupta, Jon Froehlich, Eric Lars...
126
Voted
HICSS
2009
IEEE
209views Biometrics» more  HICSS 2009»
15 years 10 months ago
SIDD: A Framework for Detecting Sensitive Data Exfiltration by an Insider Attack
Detecting and mitigating insider threat is a critical element in the overall information protection strategy. By successfully implementing tactics to detect this threat, organizat...
Yali Liu, Cherita L. Corbett, Ken Chiang, Rennie A...