Sciweavers

17582 search results - page 3419 / 3517
» From Distributed Sequential Computing to Distributed Paralle...
Sort
View
157
Voted
COCO
2009
Springer
155views Algorithms» more  COCO 2009»
15 years 9 months ago
Weak Derandomization of Weak Algorithms: Explicit Versions of Yao's Lemma
—A simple averaging argument shows that given a randomized algorithm A and a function f such that for every input x, Pr[A(x) = f(x)] ≥ 1−ρ (where the probability is over the...
Ronen Shaltiel
109
Voted
MHCI
2009
Springer
15 years 9 months ago
Impact of item density on magic lens interactions
We conducted a user study to investigate the effect of visual context in handheld augmented reality interfaces. A dynamic peephole interface (without visual context beyond the dev...
Michael Rohs, Georg Essl, Johannes Schöning, ...
SERSCISA
2009
Springer
15 years 9 months ago
ATTENTION: ATTackEr Traceback Using MAC Layer AbNormality DetecTION
Denial-of-Service (DoS) and Distributed DoS (DDoS) attacks can cause serious problems in wireless networks due to limited network and host resources. Attacker traceback is a promi...
Yongjin Kim
157
Voted
DMSN
2009
ACM
15 years 9 months ago
Message models and aggregation in knowledge based middleware for rich sensor systems
Networked, distributed real world sensing is an increasingly prominent topic in computing and has quickly expanded from resource constrained “sensor networks” measuring simple...
Joseph B. Kopena, William C. Regli, Boon Thau Loo
116
Voted
SIGCOMM
2009
ACM
15 years 9 months ago
Resonance: dynamic access control for enterprise networks
Enterprise network security is typically reactive, and it relies heavily on host security and middleboxes. This approach creates complicated interactions between protocols and sys...
Ankur Kumar Nayak, Alex Reimers, Nick Feamster, Ru...
« Prev « First page 3419 / 3517 Last » Next »